Author of the publication

Filtering IP source spoofing using feasible path reverse path forwarding with SDN.

, , , and . CNS, page 733-734. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DRM: doesn't really mean digital copyright management. Proceedings of the 9th ACM conference on Computer and communications security, page 78--87. Washington, DC, USA, ACM, (2002)Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections., and . The Economics of Information Security and Privacy, Springer, (2013)Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk vs. Freelancer., , and . The Economics of Information Security and Privacy, Springer, (2013)How In-Home Technologies Mediate Caregiving Relationships in Later Life, , , , , , and . Int. J. Hum. Comput. Interaction, 29 (7): 441--455 (2013)DigiSwitch: A Device to Allow Older Adults to Monitor and Direct the Collection and Transmission of Health Information Collected at Home., , , , , , , and . J. Medical Systems, 35 (5): 1181-1195 (2011)Pools, clubs and security: designing for a party not a person., , , and . NSPW, page 77-86. ACM, (2012)OpenFlow vulnerability assessment., , and . HotSDN, page 151-152. ACM, (2013)Privacy concerns in assisted living technologies., , , , and . Ann. des Télécommunications, 69 (1-2): 75-88 (2014)Best Practices Would Make Things Better in the IoT., , , , and . IEEE Secur. Priv., 18 (4): 38-47 (2020)Fingerprinting Edge and Cloud Services in IoT., , and . SADFE, page 13-21. IEEE, (2020)