Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart Office Spaces., , , , , , and . USENIX Workshop on Embedded Systems, USENIX Association, (1999)Survivable mobile wireless networks: issues, challenges, and research directions., , , , , , and . Workshop on Wireless Security, page 31-40. ACM, (2002)Efficient Multi-Dimensional Flow Correlation., , , , , and . LCN, page 531-538. IEEE Computer Society, (2007)Rebound: Decoy routing on asymmetric routes via error messages., , , , , , and . LCN, page 91-99. IEEE Computer Society, (2015)Smart packets: applying active networks to network management., , , , , and . ACM Trans. Comput. Syst., 18 (1): 67-88 (2000)Using signal processing to analyze wireless data traffic., , , , , and . Workshop on Wireless Security, page 67-76. ACM, (2002)A Topological Analysis of Monitor Placement., , , , and . NCA, page 169-178. IEEE Computer Society, (2007)IPv6 Router Alert Option., and . RFC, (October 1999)Decoy Routing: Toward Unblockable Internet Communication., , , , , , and . FOCI, USENIX Association, (2011)Active Network Monitoring and Control: The SENCOMM Architecture and Implementation., , , and . DANCE, page 379-393. IEEE Computer Society, (2002)