Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing the Impact of Traffic Sanitization on Latency Sensitive Applications., , and . CISIS, volume 611 of Advances in Intelligent Systems and Computing, page 1019-1026. Springer, (2017)User Controlled Task Migration in HARNESS., and . PDPTA, CSREA Press, (2000)The Harness Metacomputing Framework., and . PPSC, (1999)A Standard Interface For Grid-powered Parametric Optimization., and . GCA, page 180-185. CSREA Press, (2007)Towards energy-aware intrusion detection systems on mobile devices., , , and . HPCS, page 289-296. IEEE, (2013)On energy-based profiling of malware in Android., , and . HPCS, page 535-542. IEEE, (2014)Mobile interfaces to computational, data, and service grid systems., , , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 6 (4): 71-73 (2002)A Denial of Service Attack to GSM Networks via Attach Procedure., , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 361-376. Springer, (2013)CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices., , , , , and . ACM Trans. Cyber Phys. Syst., 4 (3): 34:1-34:19 (2020)PVM Emulation in the Harness Metacomputing System: A Plug-in Based Approach., and . PVM/MPI, volume 1697 of Lecture Notes in Computer Science, page 117-124. Springer, (1999)