Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

REFACING: An autonomic approach to network security based on multidimensional trustworthiness., , and . Comput. Networks, 52 (14): 2745-2763 (2008)Evaluating Pattern Recognition Techniques in Intrusion Detection Systems., , , , and . PRIS, page 144-153. INSTICC Press, (2005)On the Use of Cooperation as an Energy-Saving Incentive in Ad Hoc Wireless Networks., , , and . GreeNets, volume 51 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 148-160. Springer, (2011)Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation - (Short Paper)., , , and . CRITIS, volume 6983 of Lecture Notes in Computer Science, page 209-212. Springer, (2011)An extended ns-2 for validation of load balancing algorithms in Content Delivery Networks., , , and . SimuTools, page 32. ICST/ACM, (2010)An Autonomic Intrusion Detection System Based on Behavioral Network Engineering., and . INFOCOM, IEEE, (2006)Real Time Detection of Novel Attacks by Means of Data Mining Techniques., , , , and . ICEIS (3), page 120-127. (2005)Can cooperation improve energy efficiency in ad hoc wireless networks?, , and . Comput. Commun., 35 (14): 1707-1714 (2012)On the Security of the Terminal Operations for Container Shipping in Multimodal Transport: the SIS-TEMA Project., , , , and . CRiSIS, page 94-99. IEEE Computer Society, (2011)High-Speed Intrusion Detection in Support of Critical Infrastructure Protection., , and . CRITIS, volume 4347 of Lecture Notes in Computer Science, page 222-234. Springer, (2006)