Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hacking Goals: A Goal-Centric Attack Classification Framework., , and . ICTSS, volume 12543 of Lecture Notes in Computer Science, page 296-301. Springer, (2020)IntentKeeper: Intent-oriented Data Usage Control for Federated Data Analytics., , , , , , and . LCN, page 204-215. IEEE, (2020)Performance assessment of a distributed intrusion detection system in a real network scenario., , , , and . CRiSIS, page 1-8. IEEE Computer Society, (2010)When Less is More: Core-Restricted Container Provisioning for Serverless Computing., , , , and . INFOCOM Workshops, page 1153-1159. IEEE, (2020)Energy- and Delay-Efficient Routing in Mobile Ad Hoc Networks., , , and . Mob. Networks Appl., 17 (2): 281-297 (2012)Discovering reflected cross-site scripting vulnerabilities using a multiobjective reinforcement learning environment., , and . Comput. Secur., (2021)An active security protocol against DoS attacks., , , and . ISCC, page 496-501. IEEE Computer Society, (2002)Bringing service differentiation to the end system., , , and . ICON, page 436-440. IEEE, (2000)A Semantic Approach to Policy-based Management - Linking Policies to Ontologies., , and . WINSYS, page 311-317. INSTICC Press, (2007)UMPIRE: a universal moderator for the participation in IETF remote events.. IEEE Communications Magazine, 53 (4): 234-239 (2015)