Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly behavior analysis of website vulnerability and security., , and . AICCSA, page 1-7. IEEE Computer Society, (2016)Markov processes with infinitely divisible limit distributions: some examples, and . Statistics & Probability Letters, 8 (4): 363--369 (September 1989)High-bandwidth Close-Range Information Transport through Light Pipes., , , , , , , and . CoRR, (2023)Autonomic Critical Infrastructure Protection (ACIP) system., , , and . AICCSA, page 1-4. IEEE Computer Society, (2013)Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment., , , , and . ICC, page 1197-1202. IEEE, (2007)Elementary strong maps and transversal geometries., and . Discret. Math., 7 (3-4): 209-224 (1974)Towards a Tree-Based Taxonomy of Anonymous Networks., , , , and . CCNC, page 1-2. IEEE, (2009)A survey of state-of-the-art in anonymity metrics., , , , and . NDA, page 31-40. ACM, (2008)Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics., , , , and . IEEE Commun. Surv. Tutorials, 14 (2): 579-606 (2012)Slitless spectroscopy with the James Webb Space Telescope Near-Infrared Camera (JWST NIRCam), , , , , , , , , and . (2016)cite arxiv:1606.04161Comment: 11 pages with 7 figures, to be submitted to SPIE Astronomical Telescopes + Instrumentation 2016 (9904-13).