Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Storage Deduplication and Management for Application Testing over a Virtual Network Testbed., , , and . TRIDENTCOM, volume 90 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 193-207. Springer, (2011)On Automated Policy Generation for Mobile Ad Hoc Networks., , , , , , , and . POLICY, page 256-260. IEEE Computer Society, (2007)Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions., , , , , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 4523-4532. PMLR, (2021)An integrated testbed for Virtual Ad Hoc Networks., , , , , , , , and . TRIDENTCOM, page 1-10. IEEE Computer Society, (2009)ACyDS: An adaptive cyber deception system., , , , , , , and . MILCOM, page 800-805. IEEE, (2016)GNU Radio-Based Digital Communications: Computational Analysis of a GMSK Transceiver., , , and . GLOBECOM, page 1-6. IEEE, (2011)On Optimal Deadlock Detection Scheduling, , and . CoRR, (2010)VulnerVAN: A Vulnerable Network Generation Tool., , , , , , , , , and 2 other author(s). MILCOM, page 1-6. IEEE, (2019)A virtual ad hoc network testbed., , , , , , , and . Int. J. Commun. Networks Distributed Syst., 5 (1/2): 5-24 (2010)On Detecting Manifestation of Adversary Characteristics., , , , , , , , and . MILCOM, page 431-437. IEEE, (2018)