Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering IoT Malware based on Binary Similarity., , , and . NOMS, page 1-6. IEEE, (2020)Extensions to an authentication technique proposed for the global mobility network., , , and . IEEE Trans. Commun., 48 (3): 373-376 (2000)Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality., , and . GameSec, volume 7638 of Lecture Notes in Computer Science, page 152-170. Springer, (2012)Towards provable security for ad hoc routing protocols., and . SASN, page 94-105. ACM, (2004)Modelling adversaries and security objectives for routing protocols in wireless sensor networks., , and . SASN, page 49-58. ACM, (2006)Rational Exchange - A Formal Model Based on Game Theory., and . WELCOM, volume 2232 of Lecture Notes in Computer Science, page 114-126. Springer, (2001)A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals., , and . IEEE Trans. Dependable Secur. Comput., 2 (3): 268-272 (2005)Mobility helps peer-to-peer security, , and . IEEE Transactions on Mobile Computing, 5 (1): 43-51 (January 2006)Rootkit Detection on Embedded IoT Devices., , , and . Acta Cybern., 25 (2): 369-400 (2021)Self-organization in mobile ad hoc networks: the approach of Terminodes., , , , , and . IEEE Commun. Mag., 39 (6): 166-174 (2001)