Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Learning Using Privileged Information(LUPI): Botnet Detection., , , and . ICCCN, page 1-8. IEEE, (2017)Generalized Access Control of Synchronous Communication., and . Middleware, volume 4290 of Lecture Notes in Computer Science, page 281-300. Springer, (2006)The concept of decentralized and secure electronic marketplace., , , and . Electron. Commer. Res., 8 (1-2): 79-101 (2008)PLI-Sync: Prefetch Loss-Insensitive Sync for NDN Group Streaming., , , , and . ICC, page 1-6. IEEE, (2021)In Vivo Evolution of Policies that Govern a Distributed System., and . POLICY, page 134-141. IEEE Computer Society, (2009)Enabling Distributed Management for Dynamic Airborne Networks., , , , , , , and . POLICY, page 102-105. IEEE Computer Society, (2009)Establishing Enterprise Communities., , and . EDOC, page 48-58. IEEE Computer Society, (2001)ACyDS: An adaptive cyber deception system., , , , , , , and . MILCOM, page 800-805. IEEE, (2016)TREND: Trust estimation system for wireless networks via multi-pronged detection., , , and . MILCOM, page 13-18. IEEE, (2015)A virtual ad hoc network testbed., , , , , , , and . Int. J. Commun. Networks Distributed Syst., 5 (1/2): 5-24 (2010)