Author of the publication

Security challenges with cross-domain information exchange: Integrity and guessing attacks.

. MILCOM, page 1596-1605. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards dynamic spectrum access in primary OFDMA systems., , and . PIMRC, page 848-852. IEEE, (2009)Analysis of the Total Delay of IEEE 802.11e EDCA and 802.11 DCF., and . ICC, page 552-559. IEEE, (2006)Automatic Security Classification with Lasso., , , , , and . WISA, volume 9503 of Lecture Notes in Computer Science, page 399-410. Springer, (2015)Modelling the behavior of a beacon-based link sensing mechanism with variable sensing range., and . IPCCC, page 281-288. IEEE Computer Society, (2010)IncludeOS: A Minimal, Resource Efficient Unikernel for Cloud Services., , , , and . CloudCom, page 250-257. IEEE Computer Society, (2015)Spectrum sensing aided long-term spectrum management in cognitive radio networks., , , , , and . LCN, page 248-251. IEEE Computer Society, (2013)Authentication in a Multi-access IMS Environment., , , , , and . WiMob, page 613-618. IEEE Computer Society, (2008)Enhancing Security Attacks Analysis Using Regularized Machine Learning Techniques., , , and . AINA, page 909-918. IEEE Computer Society, (2017)Analysis of Time-Dependencies in Automatic Security Classification., , , and . CyberC, page 54-61. IEEE Computer Society, (2015)Optimal cooperative spectrum sensing in cognitive sensor networks., , , , and . IWCMC, page 1073-1079. ACM, (2009)