Author of the publication

On Implicit Denial of Service Attack in NDN and Potential Mitigations.

, , , , and . ICC Workshops, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malicious attacks in Mobile Device Clouds: A data driven risk assessment., , and . ICCCN, page 1-8. IEEE, (2014)Select&Spray: towards deployable opportunistic communication in large scale networks., and . MOBIWAC, page 1-8. ACM, (2013)Compute-Less Networking: Perspectives, Challenges, and Opportunities., , and . IEEE Netw., 34 (6): 259-265 (2020)NDNTP: A Named Data Networking Time Protocol., and . IEEE Netw., 34 (6): 235-241 (2020)Comparison of Text Mining Feature Extraction Methods Using Moderated vs Non-Moderated Blogs: An Autism Perspective., , , , and . PDH, page 69-78. ACM, (2019)CAF: Community aware framework for large scale mobile opportunistic networks., and . Comput. Commun., 36 (2): 180-190 (2013)Mobile-to-mobile opportunistic task splitting and offloading., , , and . WiMob, page 565-572. IEEE Computer Society, (2015)Exploiting social information for dynamic tuning in cluster based WiFi localization., , and . WiMob, page 868-875. IEEE Computer Society, (2015)Towards Mobile Opportunistic Computing., , , , and . CLOUD, page 1111-1114. IEEE Computer Society, (2015)ICedge: When Edge Computing Meets Information-Centric Networking., , , and . IEEE Internet Things J., 7 (5): 4203-4217 (2020)