Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of time series analysis to fault management in MANETs., , , and . CNSM, page 150-157. IEEE, (2010)CyberVAN: A Cyber Security Virtual Assured Network testbed., , , , , , , , , and 2 other author(s). MILCOM, page 1125-1130. IEEE, (2016)Runtime Attestation for IAAS Clouds., , , , , , and . CLOSER, page 233-247. SciTePress, (2018)Testing android devices for tactical networks: A hybrid emulation testbed approach., , , , , and . MILCOM, page 489-494. IEEE, (2015)Application of Learning Using Privileged Information(LUPI): Botnet Detection., , , and . ICCCN, page 1-8. IEEE, (2017)ROP Defense in the Cloud through LIve Text Page-level Re-ordering - The LITPR System., , , , , and . CLOSER, page 191-200. SciTePress, (2017)On the Feasibility of Deploying Software Attestation in Cloud Environments., , , , , and . IEEE CLOUD, page 128-135. IEEE Computer Society, (2014)A GNU-based packet radio for network management field testing., , , , , , , and . MILCOM, page 1-6. IEEE, (2012)DeBot: A novel network-based mechanism to detect exfiltration by architectural stealthy botnets., , , , and . Secur. Priv., (2018)Computing with time: microarchitectural weird machines., , , , , and . ASPLOS, page 758-772. ACM, (2021)