Author of the publication

Preface on the 5th International Workshop on Traffic Measurements for Cybersecurity.

, , and . EuroS&P Workshops, page 521. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Steganographic Routing in Multi Agent System Environment, , and . CoRR, (2008)Hiding Information in Retransmissions, , and . CoRR, (2009)Mobile Communications and Networks., , , and . IEEE Communications Magazine, 57 (12): 37 (2019)LACK - a VoIP steganographic method., and . Telecommun. Syst., 45 (2-3): 153-163 (2010)Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label., , , , and . NetSoft, page 450-456. IEEE, (2021)Towards Quality of Experience-based Reputation Models for Future Web Service Provisioning, , , , , and . Future Internet Architectures: New Trends in Service Architectures (2nd Euro-NF Workshop), Santander, Spain, (June 2009)Design and performance evaluation of reversible network covert channels., , , and . ARES, page 68:1-68:8. ACM, (2020)Towards Quality of Experience-based Reputation Models for Future Web Service Provisioning, , , , , and . Special Issue of the Springer Telecommunication Systems Journal: Future Internet Services and Architectures - Trends and Visions, print available in 2013, (2010)Lost audio packets steganography: the first practical evaluation.. Secur. Commun. Networks, 5 (12): 1394-1403 (2012)SecMon: end-to-end quality and security monitoring system., , , , , and . Ann. UMCS Informatica, 8 (1): 185-201 (2008)