Author of the publication

Sybil attacks as a mitigation strategy against the Storm botnet.

, , , and . MALWARE, page 32-40. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimising sybil attacks against P2P-based botnets., , and . MALWARE, page 78-87. IEEE Computer Society, (2009)Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?., , , , and . ESORICS, volume 5283 of Lecture Notes in Computer Science, page 461-480. Springer, (2008)Sybil attacks as a mitigation strategy against the Storm botnet., , , and . MALWARE, page 32-40. IEEE Computer Society, (2008)Are Deeper Levels of Risk Analysis a Requirement for Enabling Optimal Tactical Responses in INFOSEC Alert Correlation Systems?. PST, (2005)Secret Key Generation within Peer-to-Peer Network Overlays., , and . 3PGCIC, page 156-163. IEEE, (2012)Big File Protocol for OTN and Ethernet Transport Systems., , , , and . JOCN, 7 (2): 96-108 (2015)A Framework for Performing Statistical Testing of Distributed Systems., , , and . AINA Workshops, page 1041-1046. IEEE Computer Society, (2010)Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios., , , and . CNSR, page 88-95. IEEE Computer Society, (2008)Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation., , and . IEEE Trans. Inf. Forensics Secur., 7 (4): 1278-1287 (2012)Time Correlation Analysis of Secret Key Generation via UWB Channels., , and . GLOBECOM, page 1-6. IEEE, (2010)