Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sentinel: Hardware-Accelerated Mitigation of Bot-Based DDoS Attacks., , , and . ICCCN, page 633-640. IEEE, (2008)In-network server-directed client authentication and packet classification., and . LCN, page 328-331. IEEE Computer Society, (2010)Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors., , , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 89-110. Springer, (2015)DFC: Accelerating String Pattern Matching for Network Applications., , , , and . NSDI, page 551-565. USENIX Association, (2016)Resource Optimization for Integrated Terrestrial Non-Terrestrial Networks Involving IRS., , , , , and . GLOBECOM (Workshops), page 1710-1715. IEEE, (2023)UAV-assisted Cluster-head Selection Mechanism for Wireless Sensor Network Applications., , , , and . UCET, page 1-2. IEEE, (2019)Reinforcement Learning Infused MAC for Adaptive Connectivity., , , , , and . WCNC, page 1-5. IEEE, (2024)Beyond Diagonal RIS for 6G Non-Terrestrial Networks: Potentials and Challenges., , , , , and . CoRR, (2024)Non-Terrestrial Networks for 6G: Integrated, Intelligent and Ubiquitous Connectivity., , , , , , , , and . CoRR, (2024)Estimation of user activity prior for active user detection in massive machine type communications., , , , and . Signal Process., (2023)