Author of the publication

Modeling network based moving target defense impacts through simulation in Ns-3.

, , , , and . MILCOM, page 746-751. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet Security: Intrusion Detection and Prevention: Minitrack Introduction., and . HICSS, IEEE Computer Society, (2004)Reflections on Operating in Hostile Environments., , and . HICSS, IEEE Computer Society, (2004)Designing an Optimized Alert System Based on Geospatial Location Data., , and . HICSS, page 4159-4168. IEEE Computer Society, (2014)Leveraging Cognitive Principles to Improve Security Visualization., , , and . NDT (2), volume 294 of Communications in Computer and Information Science, page 262-276. Springer, (2012)Mobile Device Profiling and Intrusion Detection Using Smart Batteries., , , , , and . HICSS, page 296. IEEE Computer Society, (2008)DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses., , , and . MTD@CCS, page 77-84. ACM, (2015)Utilizing the BitTorrent DHT for blind rendezvous and information exchange., , , and . MILCOM, page 1560-1565. IEEE, (2015)The privacy implications of stateless IPv6 addressing., , , and . CSIIRW, page 52. ACM, (2010)The Blind Man's Bluff Approach to Security Using IPv6., , , , and . IEEE Secur. Priv., 10 (4): 35-43 (2012)Cover-VT: Converged Security Visualization Tool., , , and . Integrated Network Management, page 714-717. IEEE, (2011)