Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parameterizing Moving Target Defenses., , and . NTMS, page 1-6. IEEE, (2016)A survey of intrusion detection in wireless network applications., and . Comput. Commun., (2014)Performance Analysis of Admission Control Algorithms Based on Reward Optimization for Real-Time Multimedia Servers., and . Perform. Evaluation, 33 (2): 89-112 (1998)Performance evaluation of an admission control algorithm: dynamic threshold with negotiation., , and . Perform. Evaluation, 52 (1): 1-13 (2003)Signalprint-Based Intrusion Detection in Wireless Networks., , and . SEWCN, volume 42 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-88. Springer, (2009)Trust-Based Decision Making for Health IoT Systems., and . IEEE Internet of Things Journal, 4 (5): 1408-1419 (2017)Systematic Reliability Analysis of a Class of Application-Specific Embedded Software Frameworks., , , and . IEEE Trans. Software Eng., 30 (4): 218-230 (2004)Performance Analysis of Spillover-Partitioning Call Admission Control in Mobile Wireless Networks., , , and . Wireless Personal Communications, 53 (1): 111-131 (2010)The Reliability of Embedded AI Systems., and . IEEE Expert, 8 (2): 72-78 (1993)A Model for the Stability Analysis of Maintenance Stragies for Linear List., , and . Comput. J., 34 (1): 80-87 (1991)