Author of the publication

Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach.

, , , and . ISCIS, volume 264 of Lecture Notes in Electrical Engineering, page 429-438. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Görbil, Gökçe
add a person with the name Görbil, Gökçe
 

Other publications of authors with the same name

Emergency Cyber-Physical-Human Systems., , and . ICCCN, page 1-7. IEEE, (2012)Supporting QoS traffic at the network layer in multi-hop wireless mobile networks., and . IWCMC, page 1057-1062. IEEE, (2011)Counter based Detection and Mitigation of Signalling Attacks., , and . SECRYPT, page 413-418. SciTePress, (2015)Bandwidth Usage - Based Detection of Signaling Attacks., , and . ISCIS, volume 363 of Lecture Notes in Electrical Engineering, page 105-114. Springer, (2015)No way out: Emergency evacuation with no internet access.. PerCom Workshops, page 505-511. IEEE Computer Society, (2015)Resilience and security of opportunistic communications for emergency evacuation., and . PM2HW2N@MSWiM, page 115-124. ACM, (2012)Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach., , , and . ISCIS, volume 264 of Lecture Notes in Electrical Engineering, page 429-438. Springer, (2013)Pervasive emergency support systems for building evacuation., , and . PerCom Workshops, page 525-527. IEEE Computer Society, (2012)High-level information fusion and mission planning in highly anisotropic threat spaces., , , , , and . FUSION, page 1-8. IEEE, (2008)A Low-latency and Self-adapting Application Layer Multicast., , and . ISCIS, volume 62 of Lecture Notes in Electrical Engineering, page 169-172. Springer, (2010)