Author of the publication

Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service Attacks.

, , , , , and . NaNA, page 72-77. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bringing Cloud-Native Storage to SAP IQ., , , , , , , and . SIGMOD Conference, page 2410-2422. ACM, (2021)Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service Attacks., , , , , and . NaNA, page 72-77. IEEE, (2023)Understanding Ineffective Events and Reducing Test Sequences for Android Applications., , , , and . TASE, page 264-272. IEEE, (2019)Testing the Message Flow of Android Auto Apps., , , , and . SANER, page 559-563. IEEE, (2019)Neural Caches for Monte Carlo Partial Differential Equation Solvers., , , , , and . SIGGRAPH Asia, page 34:1-34:10. ACM, (2023)Characterizing and identifying misexposed activities in Android applications., , , , , and . ASE, page 691-701. ACM, (2018)ICTDroid: Parameter-Aware Combinatorial Testing for Components of Android Apps., , , , and . ASE, page 2070-2073. IEEE, (2023)iEDCL: Streamlined, False-Error-Free Error Detection and Correction Scheme in a Near-Threshold Enabled 32-bit Processor., , , , , , and . IEEE Trans. Very Large Scale Integr. Syst., 32 (8): 1436-1446 (August 2024)Parallel Implementation of SEMPHY - a Structural EM Algorithm for Phylogenetic Reconstruction., , , , and . PARCO, volume 33 of John von Neumann Institute for Computing Series, page 631-638. Central Institute for Applied Mathematics, Jülich, Germany, (2005)A Flexible Platform for Hardware-Aware Network Experiments and a Case Study on Wireless Network Coding., , and . IEEE/ACM Trans. Netw., 21 (1): 149-161 (2013)