Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CVSS Based Attack Analysis Using a Graphical Security Model: Review and Smart Grid Case Study., , , , , , , and . SGIoT, volume 354 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 116-134. Springer, (2020)Wireless network performance evaluation through emulation: WiMAX case study., , , and . ICOIN, page 265-270. IEEE Computer Society, (2015)Performance evaluation of DTN implementations on a large-scale network emulation testbed., , and . CHANTS@MobiCom, page 39-42. ACM, (2012)Challenges of using wireless network testbeds: a case study on ORBIT., , and . WiNTECH, page 11-18. ACM, (2011)Assessing Application Performance in Degraded Network Environments: An FPGA-Based Approach., , and . CPA, volume 63 of Concurrent Systems Engineering Series, page 385-395. IOS Press, (2005)AWS EC2 Public Cloud Cyber Range Deployment., , and . EuroS&P Workshops, page 433-441. IEEE, (2022)Fault injection on a large-scale network testbed., , , , , and . AINTEC, page 4-11. ACM, (2011)Behavioral Mobility Model with Geographic Constraints., , and . AINA Workshops, page 470-477. IEEE Computer Society, (2013)An interference and load aware routing metric for Wireless Mesh Networks., , and . Int. J. Ad Hoc Ubiquitous Comput., 7 (1): 25-37 (2011)QOMB: A Wireless Network Emulation Testbed., , , , , , and . GLOBECOM, page 1-6. IEEE, (2009)