Author of the publication

Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks.

, , , and . IPCCC, page 469-474. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing realistic hands-on network training in a virtual environment., , , and . SpringSim, SCS/ACM, (2009)Practical Application Layer Emulation in Industrial Control System Honeypots., , , and . Critical Infrastructure Protection, volume 485 of IFIP Advances in Information and Communication Technology, page 83-98. (2016)A secure group communication architecture for autonomous unmanned aerial vehicles., , , and . Secur. Commun. Networks, 2 (1): 55-69 (2009)SDN shim: Controlling legacy devices., and . LCN, page 169-172. IEEE Computer Society, (2015)Iterative Configuration Method: An Effective and Efficient Heuristic for Service Oriented Infrastructure Resource Allocation., , , and . SERVICES, page 156-157. IEEE Computer Society, (2010)The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology., , , , and . HICSS, page 271. IEEE Computer Society, (2007)Towards a Taxonomy of Wired and Wireless Anonymous Networks., , , , and . ICC, page 1-8. IEEE, (2009)Exploitation of HART Wired Signal Distinct Native Attribute (WS-DNA) Features to Verify Field Device Identity and Infer Operating State., , and . CRITIS, volume 8985 of Lecture Notes in Computer Science, page 24-30. Springer, (2014)Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information., , , and . WISTP, volume 5019 of Lecture Notes in Computer Science, page 36-48. Springer, (2008)Simulating windows-based cyber attacks using live virtual machine introspection., , , and . SummerSim, page 550-555. Society for Computer Simulation International / ACM DL, (2010)