Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data loss prevention for cross-domain instant messaging., , , and . SSCI, page 1-8. IEEE, (2017)Security challenges with cross-domain information exchange: Integrity and guessing attacks.. MILCOM, page 1596-1605. IEEE, (2015)Classification of Delay-based TCP Algorithms From Passive Traffic Measurements., , and . NCA, page 1-10. IEEE, (2019)A Dynamic Spectrum Access Scheme for Unlicensed Systems Coexisting with Primary OFDMA Systems., , , and . CCNC, page 1-5. IEEE, (2010)Internet connectivity for multi-homed proactive ad hoc networks., , , and . ICC, page 4050-4056. IEEE, (2004)A Model for the Loss of Hello-Messages in a Wireless Mesh Network., and . ICC, page 1-6. IEEE, (2010)State Representation Learning Using an Unbalanced Atlas., , , and . ICLR, OpenReview.net, (2024)Improving classification of tweets using word-word co-occurrence information from a large external corpus., , , and . SAC, page 1174-1177. ACM, (2016)Information Storage, Reduction and Dissemination in Sensor Networks: A Survey., , , , and . CCNC, page 1-6. IEEE, (2009)The reliability and availability of wireless backhaul mesh networks., and . ISWCS, page 178-183. IEEE, (2008)