Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloaking RFID tags., , , and . CCNC, page 1036-1040. IEEE, (2011)A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes., and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 422-434. Springer, (2017)Traffic Engineering in Enterprise Ethernet with Multiple Spanning Tree Regions., , , , and . Systems Communications, page 261-266. IEEE Computer Society, (2005)Optimal Resource Allocation in SDN/NFV-Enabled Networks via Deep Reinforcement Learning., , and . ComNet, page 1-7. IEEE, (2022)A framework for automated evaluation of security metrics., and . ARES, page 89:1-89:11. ACM, (2020)Security fusion based on state machine compositions., and . CICS, page 39-46. IEEE, (2011)Predictive Cyber-security Analytics Framework: A non-homogenous Markov model for Security Quantification., and . CoRR, (2015)On SDPN: Integrating the Software-Defined Perimeter (SDP) and the Software-Defined Network (SDN) Paradigms., , and . CNS, page 353-358. IEEE, (2022)Differentiated Survivability in Ethernet-Based MAN/WAN., , , , , and . AICCSA, page 906-910. IEEE Computer Society, (2006)Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy., , , and . ARES, page 1044-1051. IEEE Computer Society, (2008)