Author of the publication

The Impact of IPv6 on Penetration Testing.

, , , and . EUNICE, volume 7479 of Lecture Notes in Computer Science, page 88-99. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dimensioning network links: a new look at equivalent bandwidth., , , and . IEEE Network, 23 (2): 5-10 (2009)Learning from the Past: Implications for the Future Internet and its Management? (Dagstuhl Seminar 11042)., , , and . Dagstuhl Reports, 1 (1): 102-107 (2011)A demonstration of mobility prediction as a service in cloudified LTE networks., , , , and . CLOUDNET, page 78-80. IEEE, (2015)Finding Elephant flows for optical networks., , , and . Integrated Network Management, page 627-640. IEEE, (2007)Exploring security vulnerabilities of unmanned aerial vehicles., , and . NOMS, page 993-994. IEEE, (2016)ITSA: Internet traffic statistics archive., , and . NOMS, page 995-996. IEEE, (2016)A Policy-Based Hierarchical Approach for Management of Grids and Networks., , , , and . NOMS, IEEE, (2006)Booter blacklist: Unveiling DDoS-for-hire websites., , , , , and . CNSM, page 144-152. IEEE, (2016)A hybrid procedure for efficient link dimensioning., , , , and . Computer Networks, (2014)Difficulties in Modeling SCADA Traffic: A Comparative Analysis., , and . PAM, volume 7192 of Lecture Notes in Computer Science, page 126-135. Springer, (2012)