Author of the publication

The STAC (security toolbox: attacks & countermeasures) ontology.

, , and . WWW (Companion Volume), page 165-166. International World Wide Web Conferences Steering Committee / ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Constant-Window Backoff Scheme for IEEE 802.11 DCF in Single-Hop Wireless Networks Under Finite Load Conditions., and . Wireless Personal Communications, 43 (4): 1583-1602 (2007)Self-adaptive battery and context aware mobile application development., , and . IWCMC, page 761-766. IEEE, (2014)Survey, comparison and evaluation of cross platform mobile application development tools., , , and . IWCMC, page 323-328. IEEE, (2013)Impact of packetization and functional split on C-RAN fronthaul performance., , , , and . ICC, page 1-7. IEEE, (2016)Load balancing mechanism for Proxy Mobile IPv6 networks: An IP multicast perspective., and . ICNC, page 766-770. IEEE, (2014)Experimental Evaluation of Proxy Mobile IPv6: An Implementation Perspective., and . WCNC, page 1-5. IEEE, (2010)oneM2M architecture based IoT framework for mobile crowd sensing in smart cities., , , and . EuCNC, page 168-173. IEEE, (2016)Service continuity for eMBMS in LTE/LTE-Advanced network: Standard analysis and supplement., and . CCNC, page 219-224. IEEE, (2014)Considerations of IP multicast for load balancing in Proxy Mobile IPv6 networks., and . Comput. Networks, (2014)Joint Scheduling and Buffer Management Policies for DTN Applications of Different Traffic Classes., , and . IEEE Trans. Mob. Comput., 17 (12): 2818-2834 (2018)