Author of the publication

Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks.

, , , , and . Int. J. Netw. Manag., 25 (5): 320-339 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the impact of ALF on communication subsystems design and performance., and . J. High Speed Networks, 5 (2): 173-180 (1996)Dynamic Group Communication Security., , and . ISCC, page 49-56. IEEE Computer Society, (2001)A Remote Operations System Tailored to Application Requirements., and . ULPAA, volume C-25 of IFIP Transactions, page 33-47. Elsevier, (1994)Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic., , , , and . IEEE Trans. Netw. Serv. Manag., 16 (3): 842-856 (2019)Mitigating TCP Protocol Misuse With Programmable Data Planes., , , , and . IEEE Trans. Netw. Serv. Manag., 18 (1): 760-774 (2021)Empowering mobile crowdsourcing apps with user privacy control., , and . J. Parallel Distributed Comput., (2021)Exploring Smartphone Application Usage Logs with Declared Sociological Information., , , and . BDCloud-SocialCom-SustainCom, page 266-273. IEEE Computer Society, (2016)Auto-tuning of Hyper-parameters for Detecting Network Intrusions via Meta-learning., , and . NOMS, page 1-6. IEEE, (2023)Passive Monitoring of HTTPS Service Use., , , , and . CNSM, page 219-225. IEEE Computer Society, (2018)A Process Mining Approach for Supporting IoT Predictive Security., , and . NOMS, page 1-9. IEEE, (2020)