Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks., , and . Computers & Security, (2013)A connection management protocol for stateful inspection firewalls in multi-homed networks., , and . ICC, page 1887-1891. IEEE, (2004)BinGraph: Discovering mutant malware using hierarchical semantic signatures., and . MALWARE, page 104-111. IEEE Computer Society, (2012)Screening Smartphone Applications Using Behavioral Signatures., , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 14-27. Springer, (2013)Scalable attack graph for risk assessment., , and . ICOIN, page 1-5. IEEE, (2009)Reducing Payload Scans for Attack Signature Matching Using Rule Classification., and . ACISP, volume 5107 of Lecture Notes in Computer Science, page 350-360. Springer, (2008)Energy-Efficient and Fault-Tolerant Positioning of Multiple Base Stations., , , and . ICOIN, volume 5200 of Lecture Notes in Computer Science, page 584-593. Springer, (2007)Screening smartphone applications using malware family signatures., , and . Computers & Security, (2015)Network Level Privacy for Wireless Sensor Networks., , , , , and . IAS, page 261-266. IEEE Computer Society, (2008)Using Image Attributes for Human Identification Protocols, , and . CoRR, (2007)