Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient approach to the network division problem, VLANs configuration and WLANs hosts grouping., , and . LANMAN, page 241-246. IEEE, (2004)Evaluating Pattern Recognition Techniques in Intrusion Detection Systems., , , , and . PRIS, page 144-153. INSTICC Press, (2005)Dynamic SLA-Based Management of Virtual Private Networks., , , and . IWDC, volume 2170 of Lecture Notes in Computer Science, page 642-659. Springer, (2001)Real Time Detection of Novel Attacks by Means of Data Mining Techniques., , , , and . ICEIS (3), page 120-127. (2005)Resource allocation in multi-domain networks based on service level specifications., , , , and . J. Commun. Networks, 8 (1): 106-115 (2006)Assessing the scalability of component-based frameworks: the CADENUS case study., , , and . SIGMETRICS Perform. Evaluation Rev., 32 (3): 34-43 (2004)Traffic Management., , , , , , , , , and 12 other author(s). QofIS Final Report, volume 2856 of Lecture Notes in Computer Science, Springer, (2003)A Framework for Policy-Based Management of QoS Aware IP Networks., , , , , and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 1105-1110. Springer, (2002)Behavioral network engineering: making intrusion detection become autonomic., , , , and . Ann. des Télécommunications, 61 (9-10): 1136-1148 (2006)An active network approach to virtual private networks., , , , and . ISCC, page 502-507. IEEE Computer Society, (2002)