Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Privacy Awareness: for Software Creators and Users., and . iCAST, page 1-4. IEEE, (2019)Network-based Intrusion Detection - Modeling for a Larger Picture., , , , , and . LISA, page 227-232. USENIX, (2002)Security by simple network traffic monitoring., and . SIN, page 201-204. ACM, (2012)Feasibility of societal model for securing Internet of Things., and . IWCMC, page 541-546. IEEE, (2017)Management for Mobility-Aware Networks Based on Standardized Protocols., , , and . CISIS, page 327-334. IEEE Computer Society, (2009)A New Concept in Ubiquitous Network Management: Guest Node Monitoring--Applications of the MobileIPv6-MIB--., , , and . SAINT, page 17. IEEE Computer Society, (2007)Focus on accuracy and consistency of advanced applications for monitoring the future Internet., and . NOMS, page 1-4. IEEE, (2014)A Bulk-retrieval Technique for Effective Remote Monitoring in a Mobile Environment., , , and . AINA (1), page 889-894. IEEE Computer Society, (2006)Analyzing darknet TCP traffic stability at different timescales., , and . ICOIN, page 128-133. IEEE, (2018)Improving the Precision and Efficiency of Log-Based IP Packet Traceback., , , and . GLOBECOM, page 1823-1827. IEEE, (2007)