Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Last hop topology sensitive multicasting key managment., and . Q2SWinet, page 63-70. ACM, (2005)Runtime Attestation for IAAS Clouds., , , , , , and . CLOSER, page 233-247. SciTePress, (2018)Hybrid testbeds for QoS management in opaque MANETS., , , and . WICON, page 72. ICST, (2008)An Approach to Secure Localization in WLANs., , and . WCNC, page 3145-3150. IEEE, (2008)Computing with time: microarchitectural weird machines., , , , , and . ASPLOS, page 758-772. ACM, (2021)Designing Multiprocessor/Distributed Real-Time Systems Using the ASSERTS Toolkit., , , , , , and . Euro-Par, volume 1685 of Lecture Notes in Computer Science, page 505-510. Springer, (1999)Predicting End-to-end Network Load., , , , and . ICMLA, page 917-920. IEEE Computer Society, (2010)InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic., , , and . ICDCS Workshops, page 99-106. IEEE Computer Society, (2005)QAM: A comprehensive QoS-aware Middleware suite for tactical communications., , , , , , , and . MILCOM, page 1586-1591. IEEE, (2011)On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic., , , and . ICNC, page 1-6. IEEE Computer Society, (2012)