Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending Against Meek DDoS Attacks By IP Traceback-based Rate Limiting., , , and . GLOBECOM, IEEE, (2006)Guaranteeing Sound Reactions to Long-Tailed Changes: A Syntax-Directed Annotation Approach., , , , and . ICSS, page 162-169. IEEE, (2020)A Trust Management Model for Virtual Communities., , , , and . CIT, page 741-745. IEEE Computer Society, (2005)A sound response to long-tailed changes in business process management., , , , and . Serv. Oriented Comput. Appl., 16 (4): 279-291 (2022)Access Graph to Analyze Network Vulnerabilities., , and . PACIIA (2), page 781-786. IEEE Computer Society, (2008)978-0-7695-3490-9.A Feature-Oriented Framework Model for Object-Oriented Framework: An MDA Approach., , , and . CIT (2), page 199-204. IEEE Computer Society, (2009)978-0-7695-3836-5.An Improved Approach to Access Graph Generation., , and . CIS (1), page 447-452. IEEE Computer Society, (2008)Access Graph Based Risk Assessment Model for Network Information System., , and . FCST, page 42-48. IEEE Computer Society, (2008)A Novel Rate Limit Algorithm Against Meek DDoS Attacks., , , and . ATC, volume 4158 of Lecture Notes in Computer Science, page 467-476. Springer, (2006)Modeling Object-Oriented Framework with Z., , and . ISCSCT (2), page 165-170. IEEE Computer Society, (2008)