Author of the publication

ContagAlert: Using Contagion Theory for Adaptive, Distributed Alert Propagation.

, , , and . NCA, page 126-136. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ContagAlert: Using Contagion Theory for Adaptive, Distributed Alert Propagation., , , and . NCA, page 126-136. IEEE Computer Society, (2006)Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks., , and . DCOSS, volume 4026 of Lecture Notes in Computer Science, page 202-217. Springer, (2006)Securing peer-to-peer media streaming systems from selfish and malicious behavior., and . Middleware (Doctoral Symposium), page 13. ACM, (2007)Using administrative medical claims data to supplement state disease registry systems for reporting zoonotic infections., , and . JAMIA, 20 (1): 193-198 (2013)Network Response Time Monitoring Issues., and . Int. CMG Conference, page 435-438. Computer Measurement Group, (1988)Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks., and . ISM, page 340-347. IEEE Computer Society, (2008)Session Management for Accountability in Distributed Multimedia Services. University of Illinois Urbana-Champaign, USA, (2009)A trust management framework for service-oriented environments., , , , and . WWW, page 891-900. ACM, (2009)Input/Output considerations in look-ahead processing., and . SIGARCH Comput. Archit. News, 6 (1): 7-12 (1977)A concept-oriented approach to introductory computer science.. SIGCSE-1, page 162-164. ACM, (1977)