Author of the publication

Multiple Cyber-Threats Containment Via Kendall's Birth-Death-Immigration Model.

, , , and . EUSIPCO, page 2554-2558. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revealing Encrypted WebRTC Traffic via Machine Learning Tools., and . SECRYPT, page 259-266. SciTePress, (2015)IP Multimedia Subsystem in an NFV environment: availability evaluation and sensitivity analysis., , , , and . NFV-SDN, page 1-6. IEEE, (2018)Fusing Evidences from Intracranial Pressure Data using Dempster-Shafer Theory., , , , and . DSP, page 159-162. IEEE, (2007)A Layered Architecture to Manage Complex Multimedia Services., , , and . SEKE, page 414-421. (2003)MIPv6 Binding Authentication for B3G Networks., , , , and . EuroNGI Workshop, volume 3883 of Lecture Notes in Computer Science, page 170-183. Springer, (2005)An interpolation-based data fusion scheme for enhancing the resolution of thermal image sequences., , , , and . IGARSS, page 4926-4929. IEEE, (2014)Batch Methods for Resolution Enhancement of TIR Image Sequences., , , , and . IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 8 (7): 3372-3385 (2015)A 3g IMS-based Testbed for Secure Real-Time Audio Sessions., , , , , and . SECRYPT, page 125-132. INSTICC Press, (2007)Performability Management of Softwarized IP Multimedia Subsystem., , , , and . NOMS, page 1-6. IEEE, (2020)Automated Generation of Availability Models for SFCs: The case of Virtualized IP Multimedia Subsystem., , , , , and . NOMS, page 1-6. IEEE, (2020)