Author of the publication

Determining vulnerability resolution time by examining malware proliferation rates.

, , and . IWCMC, page 1678-1682. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic Route Optimization Mechanism for AODV in MANETs., and . ICC, page 1-5. IEEE, (2010)OPTIPRISM: a distributed hierarchical network management system for all-optical networks., , and . GLOBECOM, page 1531-1535. IEEE, (2001)Average Linearization of Phased Array Transmitters Under Random Amplitude and Phase Variations., , , and . ISWCS, page 553-557. IEEE, (2019)A method for assessing the success and failure of community-level interventions in the presence of network diffusion, social reinforcement, and related social effects., , , , , and . CoRR, (2018)Ethics of AI: A Systematic Literature Review of Principles and Challenges., , , , , , , , and . EASE, page 383-392. ACM, (2022)Optimizing agent placement for flow reconstruction of DDoS attacks., , , and . IWCMC, page 83-89. IEEE, (2013)Using connection expansion to reduce control traffic in MANETs., , and . IWCMC, page 534-538. ACM, (2010)Security Analysis of Firewall Rule Sets in Computer Networks., , , and . SECURWARE, page 51-56. IEEE Computer Society, (2010)Hiding Your Wares: Transparently Retrofitting Memory Confidentiality into Legacy Applications., and . ICC, page 1368-1372. IEEE, (2007)Towards a Smart(er) Social Science Using High-Dimensional Continuous-Time Trajectories from the Open Dynamic Interaction Networks (ODIN) Platform., , , , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 37-44. IEEE, (2019)