Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes., , , , and . MobiQuitous, page 1-8. IEEE Computer Society, (2007)Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment., , , , and . ICC, page 1197-1202. IEEE, (2007)Using qualia and multi-layered relationships in malware detection., , , , and . CICS, page 91-98. IEEE, (2009)Developing an Insider Threat Model Using Functional Decomposition., , and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 412-417. Springer, (2005)Performance evaluation and analysis of effective range and data throughput for unmodified bluetooth communication devices., , , and . ICON, page 665-671. IEEE, (2003)A survey of state-of-the-art in anonymity metrics., , , , and . NDA, page 31-40. ACM, (2008)A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission., , and . PerCom, page 1-7. IEEE Computer Society, (2009)An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks., , , and . HICSS, page 292. IEEE Computer Society, (2007)Graduate Digital Forensics Education at the Air Force Institute of Technology., , and . HICSS, page 264. IEEE Computer Society, (2007)Bluetooth Discovery Time with Multiple Inquirers., , and . HICSS, IEEE Computer Society, (2006)