Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Runtime Attestation for IAAS Clouds., , , , , , and . CLOSER, page 233-247. SciTePress, (2018)Last hop topology sensitive multicasting key managment., and . Q2SWinet, page 63-70. ACM, (2005)Integrated network experimentation for QoS measurements in opaque MANETs., , , and . Int. J. Netw. Manag., 20 (4): 199-218 (2010)Designing Multiprocessor/Distributed Real-Time Systems Using the ASSERTS Toolkit., , , , , , and . Euro-Par, volume 1685 of Lecture Notes in Computer Science, page 505-510. Springer, (1999)Predicting End-to-end Network Load., , , , and . ICMLA, page 917-920. IEEE Computer Society, (2010)InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic., , , and . ICDCS Workshops, page 99-106. IEEE Computer Society, (2005)Hybrid testbeds for QoS management in opaque MANETS., , , and . WICON, page 72. ICST, (2008)An Approach to Secure Localization in WLANs., , and . WCNC, page 3145-3150. IEEE, (2008)Computing with time: microarchitectural weird machines., , , , , and . ASPLOS, page 758-772. ACM, (2021)TREND: Trust estimation system for wireless networks via multi-pronged detection., , , and . MILCOM, page 13-18. IEEE, (2015)