Author of the publication

Maturity and Process Capability Models and Their Use in Measuring Resilience in Critical Infrastructure Protection Sectors.

, and . Int. J. Strateg. Inf. Technol. Appl., 5 (2): 44-63 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GRaTIS: Free Bits in the Network., , , and . IEEE Trans. Mob. Comput., 14 (1): 72-85 (2015)Selective encryption for consumer applications., and . IEEE Commun. Mag., 42 (5): 124-129 (2004)A Survey on Biologically Inspired Algorithms for Computer Networking., and . IEEE Commun. Surv. Tutorials, 15 (3): 1160-1191 (2013)Identifying Opportunities for Exploiting Cross-Layer Interactions in Adaptive Wireless Systems., , and . Adv. Multim., (2007)Modeling directionality in wireless networks: extended abstract., , , , and . SIGMETRICS, page 443-444. ACM, (2008)MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs., , , , and . MobiSys, page 191-204. ACM, (2006)BitStalker: Accurately and efficiently monitoring bittorrent traffic., , , and . WIFS, page 181-185. IEEE, (2009)Robust Coverage and Performance Testing for Large-Area Wireless Networks., , , and . AccessNets, volume 6 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 457-469. Springer, (2008)Multichannel Wormhole Switching vs. CSMA/CA for Wireless Mesh Networking., , and . WCNC, page 2105-2110. IEEE, (2008)GRaTIS: Sensing and intelligence for performance in the presence of legacy networks., , , and . CrownCom, page 42-47. ICST / IEEE, (2012)