Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-failure restoration with minimal flow operations in software defined networks., and . DRCN, page 263-266. IEEE, (2015)Heuristic algorithms for designing self-repairing protection trees in mesh networks., and . Comput. Networks, 53 (14): 2537-2551 (2009)Automated Geospatial Approach for Assessing SDG Indicator 11.3.1: A Multi-Level Evaluation of Urban Land Use Expansion across Africa., , , , , and . ISPRS Int. J. Geo Inf., 13 (7): 226 (2024)Analyzing the Quality of Synthetic Adversarial Cyberattacks., , , and . CNSM, page 1-5. IEEE, (2023)Proactive risk mitigation for communication network resilience in disaster scenarios., and . WoWMoM, page 1-4. IEEE Computer Society, (2014)A self-healing approach for LTE Evolved Packet Core., and . CCECE, page 1-5. IEEE, (2012)Network survivability in large-scale regional failure scenarios., and . C3S2E, page 83-87. ACM, (2009)Lightweight reliable overlay multicasting in large-scale P2P networks., and . C3S2E, page 10-16. ACM, (2010)Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey., , , and . IEEE Trans. Netw. Serv. Manag., 21 (1): 1190-1212 (February 2024)Building an Intrusion Detection System to Detect Atypical Cyberattack Flows., , , and . IEEE Access, (2021)