Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework for ensuring network security., , , , , and . Bell Labs Tech. J., 8 (4): 7-27 (2004)IMS security., , , , , , and . Bell Labs Tech. J., 11 (1): 37-58 (2006)A brink of failure and breach of security detection and recovery system., , , , , and . Bell Labs Tech. J., 8 (1): 113-130 (2003)Optimal availability and security for IMS-based VoIP networks., , , and . Bell Labs Tech. J., 11 (3): 211-223 (2006)Assessing Smart Grid Security., and . Bell Labs Tech. J., 17 (3): 87-103 (2012)Using the Bell Labs security framework to enhance the ISO 17799/27001 information security management system., , , , and . Bell Labs Tech. J., 12 (3): 39-54 (2007)An early application of the Bell Labs Security framework to analyze vulnerabilities in the Internet telephony domain., and . Bell Labs Tech. J., 12 (3): 7-19 (2007)Dynamic virtual private networks., , , , , and . Bell Labs Tech. J., 6 (2): 116-135 (2001)Public Safety Network Security Considerations., , and . Bell Labs Tech. J., 17 (3): 79-86 (2012)Security posture for civilian and non-civilian networks., , , , and . Bell Labs Tech. J., 8 (4): 187-202 (2004)