Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time Intrusion Detection and Suppression in ATM Networks., , and . Workshop on Intrusion Detection and Network Monitoring, page 111-118. USENIX, (1999)Thermal effects on real-time systems., and . SIGBED Review, 5 (1): 29 (2008)Adaptive Channel Estimation in Side Channel Attacks., and . WIFS, page 1-7. IEEE, (2018)Cyber-defense Training in the Real - Design Principles and Architecture of the VNEL Cyber-training Platform., , , , , , and . CSEDU (1), page 493-496. INSTICC Press, (2010)Neighborhood Failures in Random Topology Covert Communication Networks., and . ANT/SEIT, volume 32 of Procedia Computer Science, page 1127-1134. Elsevier, (2014)On Account Association With Assistance From Mobile Networks., , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 3421-3433 (July 2023)An Optimal Energy Efficient Design of Artificial Noise for Preventing Power Leakage based Side-Channel Attacks., , , and . CoRR, (2022)Algorithms for end-to-end scheduling to meet deadlines., and . SPDP, page 62-67. IEEE Computer Society, (1990)Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks., , , , and . ICPP, page 483-492. IEEE Computer Society, (2003)End-to-End Scheduling to Meet Deadlines in Distributed Systems., and . ICDCS, page 452-459. IEEE Computer Society, (1992)