Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Symbolic Honeynet Framework for SCADA System Threat Intelligence., , and . Critical Infrastructure Protection, volume 466 of IFIP Advances in Information and Communication Technology, page 103-118. Springer, (2015)An MPI tool for automatically discovering the switch level topologies of Ethernet clusters., and . IPDPS, page 1-8. IEEE, (2008)Towards a secure electricity grid., , , , , , , and . ISSNIP, page 374-379. IEEE, (2013)Trusted Group Key Management for Real-Time Critical Infrastructure Protection., , , , , , , and . MILCOM, page 248-253. IEEE, (2013)How We Deliver Our Desktop Support Services to Washington University in St. Louis the ITIL Way.. SIGUCCS, page 33-37. ACM, (2015)Middle School Students' Writing and Feedback in a Cloud-Based Classroom Environment., , , and . Technol. Knowl. Learn., 20 (2): 201-229 (2015)Evaluating Unsupervised Denoising Requires Unsupervised Metrics., , , , , , , and . CoRR, (2022)Evaluating Unsupervised Denoising Requires Unsupervised Metrics., , , , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 23937-23957. PMLR, (2023)A High Speed Hardware Scheduler for 1000-Port Optical Packet Switches to Enable Scalable Data Centers., , , and . Hot Interconnects, page 41-48. IEEE Computer Society, (2017)