Author of the publication

IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks.

, , , , , , , , , , , , , , , , , and . ISPAN, page 581-586. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Static and Dynamic Test Case Selections in Protocol Confomance Testing., and . Protocol Test Systems, volume C-3 of IFIP Transactions, page 255-266. North-Holland, (1991)Translation from LOTOS and Estelle Specifications to Extended Transition System and its Verification., and . FORTE, page 533-549. North-Holland, (1989)A Distributed Kernel Model for Reliable Group Communication., and . RTSS, page 138-146. IEEE Computer Society, (1986)Interoperability Test Generation for Communication Protocols based on Multiple Stimuli Principle., , and . TestCom, volume 210 of IFIP Conference Proceedings, page 151-168. Kluwer, (2002)An enhanced model for testing asynchronous communicating systems., , , and . FORTE, volume 156 of IFIP Conference Proceedings, page 337-356. Kluwer, (1999)Call admission control in DCA wireless network., , and . PIMRC, page 665-671. IEEE, (1998)Self-Control Cyclic Access with Time Division - A MAC Proposal for the HFC System., , and . ICC (2), page 1030-1034. IEEE, (1997)Improved Strategies for Dynamic Load Balancing., and . IEEE Concurrency, 7 (3): 58-67 (1999)Avoiding Name Resolution Loops and Duplications in Group Communications., , and . SIGCOMM, page 220-230. ACM, (1990)Quality of Service Routing Algorithms for Bandwidth-Delay Constrained Applications., , and . ICNP, page 62-70. IEEE Computer Society, (2001)