Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transmission Power Control in Body Area Sensor Networks for Healthcare Monitoring., , , and . IEEE J. Sel. Areas Commun., 27 (1): 37-48 (2009)Perspectives on Net Neutrality and Internet Fast-Lanes., , and . Comput. Commun. Rev., 46 (1): 64-69 (2016)Combining Device Behavioral Models and Building Schema for Cybersecurity of Large-Scale IoT Infrastructure., , , and . IEEE Internet Things J., 9 (23): 24174-24185 (2022)Enhancing Security Management at Software-Defined Exchange Points., , , and . IEEE Trans. Netw. Serv. Manag., 16 (4): 1479-1492 (2019)Implementing Geo-Blocking and Spoofing Protection in Multi-Domain Software Defined Interconnects., , , , and . XDOMO@EuroSys, page 1:1-1:6. ACM, (2017)Improving secret key generation performance for on-body devices., , , and . BODYNETS, page 19-22. ACM, (2011)TeleScope: Flow-Level Video Telemetry Using SDN., , , and . EWSDN, page 31-36. IEEE Computer Society, (2016)Demo Abstract: A Tool to Detect and Visualize Malicious DNS Queries for Enterprise Networks., , , , and . IM, page 729-730. IFIP, (2019)A Dynamic Stateful Multicast Firewall., , , and . ICC, page 1280-1285. IEEE, (2007)Virtualizing national broadband access infrastructure., and . CoNEXT Student Workhop, page 27-30. ACM, (2013)