Author of the publication

Improving IP Prefix Hijacking Detection by Tracing Hijack Fingerprints and Verifying Them through RIR Databases.

, and . DCNET, page 57-63. SciTePress, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Test Case Derivation from Statecharts-based Models., , , and . INC, page 127-132. Plymouth University, (2016)A M2M-based Automotive Service Delivery Platform for Distributed Vehicular Applications., , , and . INC, page 35-45. Plymouth University, (2014)A Bootstrap Mechanism for NGN QoS Profiling., , , , and . INC, page 61-70. University of Plymouth, (2010)Assay of Multipath TCP for Session Continuity in Distributed Mobility Management., , and . INC, page 141-146. Plymouth University, (2016)IP prefix hijack detection using BGP connectivity monitoring., and . HPSR, page 35-41. IEEE, (2016)Synergy of Trust, Blockchain and Smart Contracts for Optimization of Decentralized IoT Service Platforms., , , , and . AINA, volume 1151 of Advances in Intelligent Systems and Computing, page 547-558. Springer, (2020)A Sample of Consumer Wi-Fi Use & Security in the UK., , and . CNSR, page 386-390. IEEE Computer Society, (2009)P2p-based community concept for M2M applications., , , and . FGCT, page 114-119. IEEE, (2013)Enhancing Data Security in Cloud using Random Pattern Fragmentation and a Distributed NoSQL Database., , and . SMC, page 3735-3740. IEEE, (2019)NFV Resource Advertisement and Discovery Protocol for a Distributed NFV Orchestration in a WMN-based Disaster Network., , , , and . SoftCOM, page 1-6. IEEE, (2019)