Author of the publication

Assessing Trade-Offs between Stealthiness and Node Recruitment Rates in Peer-to-Peer Botnets.

, , , and . 3PGCIC, page 148-155. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secret Key Generation within Peer-to-Peer Network Overlays., , and . 3PGCIC, page 156-163. IEEE, (2012)Big File Protocol for OTN and Ethernet Transport Systems., , , , and . JOCN, 7 (2): 96-108 (2015)A Framework for Performing Statistical Testing of Distributed Systems., , , and . AINA Workshops, page 1041-1046. IEEE Computer Society, (2010)Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios., , , and . CNSR, page 88-95. IEEE Computer Society, (2008)Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation., , and . IEEE Trans. Inf. Forensics Secur., 7 (4): 1278-1287 (2012)Robust adversarial learning and invariant measures., , and . PACRIM, page 529-535. IEEE, (2015)Verification of Secret Key Generation from UWB Channel Observations., , , , and . ICC, page 1-5. IEEE, (2009)A model based approach to fault detection for the reverse path of cable television networks., , and . IEEE Trans. Broadcast., 44 (4): 478-487 (1998)Time Correlation Analysis of Secret Key Generation via UWB Channels., , and . GLOBECOM, page 1-6. IEEE, (2010)Jamming Strategies in DYMO MANETs: Assessing Detectability and Operational Impacts., , and . BWCCA, page 114-121. IEEE, (2012)