Author of the publication

High-level information fusion and mission planning in highly anisotropic threat spaces.

, , , , , and . FUSION, page 1-8. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Low-latency and Self-adapting Application Layer Multicast., , and . ISCIS, volume 62 of Lecture Notes in Electrical Engineering, page 169-172. Springer, (2010)Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations., and . CRITIS, volume 6027 of Lecture Notes in Computer Science, page 34-49. Springer, (2009)High-level information fusion and mission planning in highly anisotropic threat spaces., , , , , and . FUSION, page 1-8. IEEE, (2008)Emergency Cyber-Physical-Human Systems., , and . ICCCN, page 1-7. IEEE, (2012)Counter based Detection and Mitigation of Signalling Attacks., , and . SECRYPT, page 413-418. SciTePress, (2015)Supporting QoS traffic at the network layer in multi-hop wireless mobile networks., and . IWCMC, page 1057-1062. IEEE, (2011)Principles of Pervasive Cloud Monitoring., , and . ISCIS, page 117-124. Springer, (2014)Resilient Emergency Evacuation Using Opportunistic Communications., and . ISCIS, page 249-257. Springer, (2012)Detection and mitigation of signaling storms in mobile networks., , and . ICNC, page 1-5. IEEE Computer Society, (2016)Security for smart mobile networks: The NEMESYS approach., , , , , , and . PRISMS, page 1-8. IEEE, (2013)