Author of the publication

Broadband Network Services: Architecture for High Speed Multimedia Networking.

, , and . HPN, volume C-26 of IFIP Transactions, page 259-272. North-Holland, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing MANETs with BITSI: danger theory and mission continuity., , , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6973 of SPIE Proceedings, page 69730D. SPIE, (2008)Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls., , , , and . SEKE, page 802-807. Knowledge Systems Institute Graduate School, (2008)Needles in Haystacks: Practical Intrusion Detection from Theoretical Results., and . LCN, page 571-573. IEEE Computer Society, (2006)A Model-based Approach to the Security Testing of Network Protocol Implementations., , and . LCN, page 1008-1015. IEEE Computer Society, (2006)MAGNA: Modeling And Generating Network Attacks., and . LCN, page 423-424. IEEE Computer Society, (2004)Overview of the NBBS Architecture., , , and . IBM Syst. J., 34 (4): 564-589 (1995)On the Self-similarity of Synthetic Traffic for the Evaluation of Intrusion Detection Systems., and . SAINT, page 242-248. IEEE Computer Society, (2003)Simulating application level self-similar network traffic using hybrid heavy-tailed distributions., and . ACM Southeast Regional Conference (2), page 54-58. ACM, (2005)1-59593-059-0.Realistic internet traffic simulation through mixture modeling and a case study., and . WSC, page 2408-2416. IEEE Computer Society, (2005)A New Program in Information Technology., and . ITCC, page 2-8. IEEE Computer Society, (2003)