Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quick Suppression of DDoS Attacks by Frame Priority Control in IoT Backhaul With Construction of Mirai-Based Attacks., , , , , , , and . IEEE Access, (2022)On the Impact of Mobile Network Delays on Connection Establishment Performance of a Carrier Grade NAT Device., , , , , , and . AINTEC, page 1. ACM, (2014)SF-TAP: Scalable and Flexible Traffic Analysis Platform Running on Commodity Hardware., , , , and . LISA, page 25-36. USENIX Association, (2015)Memory-saving LDoS Attacker Detection Algorithms in Zigbee Network., , , , , and . J. Inf. Process., (2023)How beneficial is peer-to-peer DMA?, , and . APSys, page 25-32. ACM, (2020)BluMoon: Bluetooth Low Energy Emulation System with Software-Implemented Controller., , and . PerCom Workshops, page 860-865. IEEE Computer Society, (2018)XAI-driven Adversarial Attacks on Network Intrusion Detectors., , , , , , , and . EICC, page 65-73. ACM, (2024)NETorium: high-fidelity scalable wireless network emulator., , , , and . AINTEC, page 25-32. ACM, (2016)AOBAKO: A Testbed for Context-Aware Applications with Physicalizing Virtual Beacons., , , , , , , , and . UbiComp/ISWC Adjunct, page 476-479. ACM, (2018)A Design of Stateless 5G Core Network with Procedural Processing., , , , and . BlackSeaCom, page 199-204. IEEE, (2023)