Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GNU Radio-Based Digital Communications: Computational Analysis of a GMSK Transceiver., , , and . GLOBECOM, page 1-6. IEEE, (2011)Snow on Silk: A NodeOS in the Linux Kernel., , , and . IWAN, volume 2546 of Lecture Notes in Computer Science, page 1-19. Springer, (2002)ACyDS: An adaptive cyber deception system., , , , , , , and . MILCOM, page 800-805. IEEE, (2016)Insider attack detection using weak indicators over network flow data., , , , , and . MILCOM, page 1-6. IEEE, (2015)P4-Based Hybrid Error Control Booster Providing New Design Tradeoffs in Wireless Networks., , , , and . MILCOM, page 731-736. IEEE, (2019)Portable Programmable Layer 3 QoS for Tactical MANETs: A P4/PSA-Based Architectural Approach., , and . MILCOM, page 108-112. IEEE, (2019)A GNU-based packet radio for network management field testing., , , , , , , and . MILCOM, page 1-6. IEEE, (2012)Building an operation support system for a fast reconfigurable network experimentation testbed., , , , , , , , , and . MILCOM, page 1-6. IEEE, (2012)Building a Robust Software-Based Router Using Network Processors., , , and . SOSP, page 216-229. ACM, (2001)Operating System Review 35(5).Service Brokering and Mediation: Enabling Next Generation Market and Customer Driven Service Delivery., , , and . ISADS, page 525-530. IEEE Computer Society, (2011)