Author of the publication

Assessing Trade-Offs between Stealthiness and Node Recruitment Rates in Peer-to-Peer Botnets.

, , , and . 3PGCIC, page 148-155. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Jamming Strategies in DYMO MANETs: Assessing Detectability and Operational Impacts., , and . BWCCA, page 114-121. IEEE, (2012)Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation., , and . IEEE Trans. Inf. Forensics Secur., 7 (4): 1278-1287 (2012)A model based approach to fault detection for the reverse path of cable television networks., , and . IEEE Trans. Broadcast., 44 (4): 478-487 (1998)Verification of Secret Key Generation from UWB Channel Observations., , , , and . ICC, page 1-5. IEEE, (2009)Time Correlation Analysis of Secret Key Generation via UWB Channels., , and . GLOBECOM, page 1-6. IEEE, (2010)Robust adversarial learning and invariant measures., , and . PACRIM, page 529-535. IEEE, (2015)A Distributed Application-Level IT System Workload Generator., , and . AINA Workshops, page 1100-1105. IEEE Computer Society, (2009)On Assessing the Impact of Jamming Strategies on the Behavior of DYMO-Based MANETs., , and . BWCCA, page 167-174. IEEE Computer Society, (2011)Efficiently Achieving Full Three-Way Non-repudiation in Consumer-Level eCommerce and M-Commerce Transactions., and . TrustCom, page 664-672. IEEE Computer Society, (2011)Dynamic Resource Allocation in Computing Clouds Using Distributed Multiple Criteria Decision Analysis., , , , , , and . IEEE CLOUD, page 91-98. IEEE Computer Society, (2010)