Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Android as a server platform., , , , and . CCNC, page 1181-1185. IEEE, (2011)A countermeasure againstDDOS attacks using active networks technologies., , and . Ann. des Télécommunications, 58 (3-4): 605-629 (2003)Convex Hull of the Union of Convex Objects in the Plane: an Adaptive Analysis., and . CCCG, (2008)Space-Efficient Algorithms for Klee's Measure Problem., and . CCCG, page 27-30. (2005)FSP: Federation of Service Providers on the Internet., and . ISCC, page 1213-1218. IEEE Computer Society, (2003)Scalable Detection of SIP Fuzzing Attacks., and . SECURWARE, page 114-119. IEEE Computer Society, (2008)Geometric Streaming Algorithms with a Sorting Primitive.. ISAAC, volume 4835 of Lecture Notes in Computer Science, page 512-524. Springer, (2007)AEGIS: An Active-Network-Powered Defense Mechanism against DDoS Attacks.. IWAN, volume 2207 of Lecture Notes in Computer Science, page 1-15. Springer, (2001)User Demand Prediction from Application Usage Pattern in Virtual Smartphone., , , , and . CloudCom, page 449-455. IEEE Computer Society, (2010)Practical techniques for defending against DDoS attacks., and . AICCSA, page 72. IEEE Computer Society, (2005)