Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ARIA: interactive damage prediction system for urban flood using simulation and emulation federation platform., , , , , , , and . UbiComp/ISWC Adjunct, page 284-287. ACM, (2019)Extensions for Wireless Technology Emulation to Wire-based Network Testbed., , , , , , , and . WPMC, page 1-6. IEEE, (2021)Emulation-Based ICT System Resiliency Verification for Disaster Situations., , , , , , , and . SITIS, page 875-882. IEEE Computer Society, (2013)NETorium: high-fidelity scalable wireless network emulator., , , , and . AINTEC, page 25-32. ACM, (2016)AOBAKO: A Testbed for Context-Aware Applications with Physicalizing Virtual Beacons., , , , , , , , and . UbiComp/ISWC Adjunct, page 476-479. ACM, (2018)A Design of Stateless 5G Core Network with Procedural Processing., , , , and . BlackSeaCom, page 199-204. IEEE, (2023)Memory-saving LDoS Attacker Detection Algorithms in Zigbee Network., , , , , and . J. Inf. Process., (2023)How beneficial is peer-to-peer DMA?, , and . APSys, page 25-32. ACM, (2020)BluMoon: Bluetooth Low Energy Emulation System with Software-Implemented Controller., , and . PerCom Workshops, page 860-865. IEEE Computer Society, (2018)XAI-driven Adversarial Attacks on Network Intrusion Detectors., , , , , , , and . EICC, page 65-73. ACM, (2024)