Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Jamhour, Edgard
add a person with the name Jamhour, Edgard
 

Other publications of authors with the same name

Intrusion Detection in Virtual Machine Environments., , and . EUROMICRO, page 520-525. IEEE Computer Society, (2004)Channel allocation algorithms for co-existence of base stations in IEEE 802.22 networks., , , and . J. High Speed Networks, 21 (1): 57-68 (2015)A clustering-based method for intrusion detection in web servers., and . ICT, page 1-5. IEEE, (2013)SDN Architecture for 6LoWPAN Wireless Sensor Networks., , , and . Sensors, 18 (11): 3738 (2018)Distributed Security Management Using LDAP Directories.. SCCC, page 144-153. IEEE Computer Society, (2001)TIP6: a transition mechanism for implementing mobile networks., and . ICCCN, page 342-347. IEEE, (2002)Optimal DiffServ AC Design using Non-Linear Programming., , , , and . LCN, page 591-598. IEEE Computer Society, (2007)DiffServ Management on Mobile IP Networks using COPS-PR., , , and . Net-Con, volume 229 of IFIP, page 187-198. Springer, (2005)A Framework for Protecting Web Sevices with IPsec., , and . EUROMICRO, page 290-297. IEEE Computer Society, (2004)A Tunable Fraud Detection System for Advanced Metering Infrastructure Using Short-Lived Patterns., , , , , and . IEEE Trans. Smart Grid, 10 (1): 830-840 (2019)