Author of the publication

A specification-based intrusion detection engine for infrastructure-less networks.

, , , and . Computer Communications, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Minimizing node churn in peer-to-peer streaming., and . Computer Communications, 33 (14): 1598-1614 (2010)Characterization and multiplexing of correlated traffic from sources with different time constants.. Computer Communications, 19 (13): 1112-1123 (1996)A specification-based intrusion detection engine for infrastructure-less networks., , , and . Computer Communications, (2014)A Markov Service Policy with Application to the Queueing Study of a DQDB Station., and . Computer Networks and ISDN Systems, 26 (12): 1503-1522 (1994)Large impact of temporal/spatial correlations on per-session performance measures: single and multiple node cases., , and . Perform. Eval., 41 (2-3): 83-116 (2000)Adaptive rate control in high-speed networks: performance issues., and . Computer Networks, 37 (3/4): 363-382 (2001)Adaptive playout strategies for packet video receivers with finite buffer capacity., and . ICC, page 969-973. IEEE, (2001)Low-cost enhancement of the Intra-domain Internet robustness against intelligent node attacks., and . DRCN, page 219-226. IEEE, (2015)A generic mechanism for efficient authentication in B3G networks., , and . Computers & Security, 29 (4): 460-475 (2010)Social Similarity Favors Cooperation: The Distributed Content Replication Case., , and . IEEE Trans. Parallel Distrib. Syst., 24 (3): 601-613 (2013)