Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Denial-of-Service Attack-Detection Techniques., , , and . IEEE Internet Comput., 10 (1): 82-89 (2006)Using hybrid simulation/emulation for experimental assessment of routing policy on mission outcomes., and . MILCOM, page 1-7. IEEE, (2012)Path preserving scale down for validation of internet inter-domain routing protocols., , , and . WSC, page 2210-2218. IEEE Computer Society, (2006)A field programmable system chip which combines FPGA and ASIC circuitry., , , , , , , , , and 2 other author(s). CICC, page 183-186. IEEE, (1999)Large-scale testing of the Internet's Border Gateway Protocol (BGP) via topological scale-down., and . ACM Trans. Model. Comput. Simul., 18 (3): 11:1-11:30 (2008)Developing a Series of AI Challenges for the United States Department of the Air Force., , , , , , , , , and 32 other author(s). CoRR, (2022)Wavelet based Denial-of-Service detection., , and . Comput. Secur., 25 (8): 600-615 (2006)Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra., and . Comput. Networks, 55 (10): 2361-2379 (2011)Performance of BGP among mobile military networks., , and . MILCOM, page 679-686. IEEE, (2011)