Author of the publication

A Discussion on Security Education in Academia.

, , , , , and . ACM Conference on Computer and Communications Security, page 2187-2188. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Perspective on Providing Cloud Computing Security - A Position Paper., , , , and . CLOSER, page 650-655. SciTePress, (2011)Improved SDN responsiveness to UDP flood attacks., , and . CNS, page 715-716. IEEE, (2015)One Pass Packet Steering (OPPS) for stateless policy chains in multi-subscriber SDN., , and . INFOCOM Workshops, page 408-413. IEEE, (2017)Towards power profiling of Android permissions., , and . NTMS, page 1-5. IEEE, (2015)The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey., , , and . CoRR, (2019)Optimal Slice Allocation in 5G Core Networks., and . CoRR, (2018)A Discussion on Security Education in Academia., , , , , and . ACM Conference on Computer and Communications Security, page 2187-2188. ACM, (2018)Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management., , and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 104-121. (2005)Proactive Allocation as Defense for Malicious Co-residency in Sliced 5G Core Networks., and . CoRR, (2020)IoT Trust Establishment Through System Level Interactions and Communication Attributes., , , and . GLOBECOM, page 5919-5924. IEEE, (2023)