Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Last hop topology sensitive multicasting key managment., and . Q2SWinet, page 63-70. ACM, (2005)Runtime Attestation for IAAS Clouds., , , , , , and . CLOSER, page 233-247. SciTePress, (2018)Designing Multiprocessor/Distributed Real-Time Systems Using the ASSERTS Toolkit., , , , , , and . Euro-Par, volume 1685 of Lecture Notes in Computer Science, page 505-510. Springer, (1999)Integrated network experimentation for QoS measurements in opaque MANETs., , , and . Int. J. Netw. Manag., 20 (4): 199-218 (2010)Predicting End-to-end Network Load., , , , and . ICMLA, page 917-920. IEEE Computer Society, (2010)InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic., , , and . ICDCS Workshops, page 99-106. IEEE Computer Society, (2005)TREND: Trust estimation system for wireless networks via multi-pronged detection., , , and . MILCOM, page 13-18. IEEE, (2015)Voice performance in WLAN networks - an experimental study., , , , , , , , and . GLOBECOM, page 3504-3508. IEEE, (2003)QAM: A comprehensive QoS-aware Middleware suite for tactical communications., , , , , , , and . MILCOM, page 1586-1591. IEEE, (2011)Towards a Theory of Intrusion Detection., , and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 267-286. Springer, (2005)