Author of the publication

Assessing the security of a clean-slate Internet architecture.

, , , and . ICNP, page 1-6. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Course on Computer and Network Security: Teaching Online Versus Face-to-Face., , , , and . World Conference on Information Security Education, volume 237 of IFIP, page 57-64. Springer, (2007)CovidCTNet: an open-source deep learning approach to diagnose covid-19 using small cohort of CT images., , , , , , , , , and 12 other author(s). npj Digit. Medicine, (2021)Visualization tools for presenting and analysis of global landscapes of vaccine targets., , , , and . BIBM Workshops, page 683-688. IEEE Computer Society, (2011)Applications of single cell profiles of PBMC: Improvements of cell type classification., , , , , , , and . BIBM, page 3334-3340. IEEE, (2021)Assessing the security of a clean-slate Internet architecture., , , and . ICNP, page 1-6. IEEE Computer Society, (2012)Probe design optimization of HLA microarray: Data cleaning of probe signals from cDNA tiling microarray: Outlier detection, noise reduction, and identification of uninformative probes in HLA typing application., , , , , and . BIBM Workshops, page 680-682. IEEE Computer Society, (2011)Antidote application: an educational system for treatment of common toxin overdose., , , , and . BCB, page 598-599. ACM, (2014)Bounding the router table size in an ISP network using RINA., , , , , , , , and . NOF, page 57-61. IEEE, (2011)Correctness of Cell Labels in Public Single Cell Transcriptomics Datasets., , , , , , and . BIBM, page 3280-3284. IEEE, (2021)Transport over Heterogeneous Networks Using the RINA Architecture., , , , , , , , and . WWIC, volume 6649 of Lecture Notes in Computer Science, page 297-308. Springer, (2011)