Author of the publication

Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information.

, , , and . PADS, page 199-206. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

nSwitching: Virtual Machine aware relay hardware switching to improve intra-NIC Virtual Machine traffic., and . ICC, page 2700-2705. IEEE, (2012)iCAPTCHA: The Next Generation of CAPTCHA Designed to Defend against 3rd Party Human Attacks., , and . ICC, page 1-6. IEEE, (2011)Monitoring and early warning for internet worms., , , and . ACM Conference on Computer and Communications Security, page 190-199. ACM, (2003)Harnessing the power of BitTorrent for distributed denial-of-service attacks., , , and . Secur. Commun. Networks, 4 (8): 860-870 (2011)Modeling Botnet Propagation Using Time Zones., , and . NDSS, The Internet Society, (2006)Wi-Fi access denial of service attack to smartphones., , and . Int. J. Secur. Networks, 8 (3): 117-129 (2013)Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms., , , , and . MILCOM, page 672-678. IEEE, (2022)Pervasive Internet Access by Vehicles through Satellite Receive-Only Terminals., , and . ICCCN, page 1-6. IEEE Computer Society, (2009)PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks., , and . NCA, page 198-203. IEEE Computer Society, (2010)Extension of internet access to VANET via satellite receive-only terminals., , and . Int. J. Ad Hoc Ubiquitous Comput., 14 (3): 172-190 (2013)