Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations., and . CRITIS, volume 6027 of Lecture Notes in Computer Science, page 34-49. Springer, (2009)A Low-latency and Self-adapting Application Layer Multicast., , and . ISCIS, volume 62 of Lecture Notes in Electrical Engineering, page 169-172. Springer, (2010)High-level information fusion and mission planning in highly anisotropic threat spaces., , , , , and . FUSION, page 1-8. IEEE, (2008)Emergency Cyber-Physical-Human Systems., , and . ICCCN, page 1-7. IEEE, (2012)Counter based Detection and Mitigation of Signalling Attacks., , and . SECRYPT, page 413-418. SciTePress, (2015)Supporting QoS traffic at the network layer in multi-hop wireless mobile networks., and . IWCMC, page 1057-1062. IEEE, (2011)Bandwidth Usage - Based Detection of Signaling Attacks., , and . ISCIS, volume 363 of Lecture Notes in Electrical Engineering, page 105-114. Springer, (2015)Resilience and security of opportunistic communications for emergency evacuation., and . PM2HW2N@MSWiM, page 115-124. ACM, (2012)Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach., , , and . ISCIS, volume 264 of Lecture Notes in Electrical Engineering, page 429-438. Springer, (2013)No way out: Emergency evacuation with no internet access.. PerCom Workshops, page 505-511. IEEE Computer Society, (2015)