Author of the publication

Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks

, , , and . Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks, , , and . Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, (2006)DAIDALOS demo booth, CDA, , and . Demonstration, (June 2005)Traffic Anomaly Detection and Diagnosis on the Network Flow Level.. EPFL, Switzerland, (2011)FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics., , , , , and . ICDE, page 1316-1327. IEEE Computer Society, (2015)Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic., , , , , , and . DSN, page 76-87. IEEE, (2020)Dressed up: Baiting Attackers through Endpoint Service Projection., , , and . SDN-NFV@CODASPY, page 23-28. ACM, (2018)Stream computing for large-scale, multi-channel cyber threat analytics., , , , , , , , and . IRI, page 8-15. IEEE Computer Society, (2014)Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception., , , and . DIMVA, volume 10885 of Lecture Notes in Computer Science, page 256-278. Springer, (2018)Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility., , , , , , , and . IBM J. Res. Dev., 60 (4): 10 (2016)AI vs. AI: Exploring the Intersections of AI and Cybersecurity., , and . IWSPA@CODASPY, page 1. ACM, (2021)