Author of the publication

On Implicit Denial of Service Attack in NDN and Potential Mitigations.

, , , , and . ICC Workshops, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SCOUT: Social Context-Aware Ubiquitous System., , and . NTMS, page 1-6. IEEE, (2012)ICedge: When Edge Computing Meets Information-Centric Networking., , , and . IEEE Internet Things J., 7 (5): 4203-4217 (2020)DICE: Dynamic Multi-RAT Selection in the ICN-enabled Wireless Edge., , , , and . Comput. Commun. Rev., 47 (5): 67-72 (2017)Social-Based Trust in Mobile Opportunistic Networks., and . ICCCN, page 1-6. IEEE, (2011)On practical device-to-device wireless communication: A measurement driven study., , , , and . IWCMC, page 409-414. IEEE, (2017)Distributed Data-Gathering and -Processing in Smart Cities: An Information-Centric Approach., , and . Open J. Internet Things, 5 (1): 93-104 (2019)Towards Computational Offloading in Mobile Device Clouds., , and . CloudCom (1), page 331-338. IEEE Computer Society, (2013)Collaborative mobile-to-mobile computation offloading., , , , and . CollaborateCom, page 460-465. ICST / IEEE, (2014)Towards Intelligent Edge Storage Management: Determining and Predicting Mobile File Popularity., , , and . MobileCloud, page 23-28. IEEE Computer Society, (2018)Malicious attacks in Mobile Device Clouds: A data driven risk assessment., , and . ICCCN, page 1-8. IEEE, (2014)