Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table., , and . ESORICS, volume 3193 of Lecture Notes in Computer Science, page 369-384. Springer, (2004)Temporal Partitioning for Partially-Reconfigurable-Field-Programmable Gate., and . IPPS/SPDP Workshops, volume 1388 of Lecture Notes in Computer Science, page 37-42. Springer, (1998)A comparison of auction and flat pricing for differentiated service networks., , and . ICC, page 2086-2091. IEEE, (2004)M-MPLS: Micromobility-enabled multiprotocol label switching., , , , , and . ICC, page 250-255. IEEE, (2003)Leveraging SDN and WebRTC for Rogue Access Point Security., , and . IEEE Trans. Network and Service Management, 14 (3): 756-770 (2017)The effects of quality of service on vehicular network pseudonym distribution in congested urban environments., , and . WCNC Workshops, page 365-370. IEEE, (2012)A pricing approach for bandwidth allocation in differentiated service networks., , , and . Comput. Oper. Res., 35 (12): 3769-3786 (2008)Wireless Intrusion Detection and Response., , , and . IAW, page 68-75. IEEE, (2003)VLSI Architecture for Switch-Level Simulation.. MASCOTS, page 44-49. The Society for Computer Simulation, (1993)QoS support for UDP/TCP based networks., , , and . Comput. Commun., 24 (1): 64-77 (2001)