Author of the publication

Poster: Cyber-Function Virtualization for Mobile Cyber-Physical Systems.

, , and . MobiSys (Companion Volume), page 136. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power Allocation for Multi-Hop Transmission Using Unsaturated Full-Duplex Relay Network Model., , , and . IEEE Wirel. Commun. Lett., 7 (6): 906-909 (2018)DIVERGENCE: Deep Reinforcement Learning-Based Adaptive Traffic Inspection and Moving Target Defense Countermeasure Framework., , , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 4834-4846 (December 2022)HMTP: Multipath transport protocol for multihoming wireless erasure networks., , , , and . Trans. Emerg. Telecommun. Technol., 26 (8): 1061-1072 (2015)Increasing network lifetime using data compression in wireless sensor networks with energy harvesting., , , and . Int. J. Distributed Sens. Networks, (2017)Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense., , , , , , and . J. Netw. Comput. Appl., (2020)Malicious Data Frame Injection Attack Without Seizing Association in IEEE 802.11 Wireless LANs., , and . IEEE Access, (2021)CLiCK: Continual Learning Exploiting Intermediate Network Models With A Slack Class., , and . IEEE Access, (2023)Analysis and design of the virtual rate control algorithm for stabilizing queues in TCP networks., , , and . Comput. Networks, 44 (1): 17-41 (2004)DESOLATER: Deep Reinforcement Learning-Based Resource Allocation and Moving Target Defense Deployment Framework., , , , , and . IEEE Access, (2021)Feedback-assisted robust estimation of available bandwidth., , , and . Comput. Networks, 53 (7): 896-912 (2009)