Author of the publication

Modelling and Simulation of a Defense Strategy to Face Indirect DDoS Flooding Attacks.

, , , and . IDCS, volume 8729 of Lecture Notes in Computer Science, page 263-274. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spontaneous smartphone networks as a user-centric solution for the future internet., , , , and . IEEE Commun. Mag., 52 (12): 26-33 (2014)A collaborative task-oriented scheduling driven routing approach for industrial IoT based on mobile devices., , , , , and . Ad Hoc Networks, (2018)Smart Wireless Access Networks and Systems for Smart Cities., , , , and . Ad Hoc Networks, (2016)A Mission-Oriented Coordination Framework for Teams of Mobile Aerial and Terrestrial Smart Objects., , , and . Mob. Networks Appl., 21 (4): 708-725 (2016)Environment-fusion multipath routing protocol for wireless sensor networks., , , , and . Inf. Fusion, (2020)OpenBTS: A Step Forward in the Cognitive Direction., and . ICCCN, page 1-6. IEEE, (2012)Multilayered Architecture Supporting Efficient Inter HAP-Satellite Routing., and . VTC Spring, page 1360-1364. IEEE, (2007)Neural networks and SDR modulation schemes for wireless mobile nodes: A synergic approach., , , and . Ad Hoc Networks, (2017)A reliability-based resource sharing scheduler for mobile and fixed users in Community Networks., and . ICC, page 3770-3775. IEEE, (2015)Securing the IoT world: Issues and perspectives., , and . CSCN, page 246-251. IEEE, (2017)