Author of the publication

Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments.

, , and . GridNets, page 16. ICST, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Watkins, Lanier
add a person with the name Watkins, Lanier
 

Other publications of authors with the same name

Using network traffic to verify mobile device forensic artifacts., , , , , and . CCNC, page 114-119. IEEE, (2017)Constructing timing-based covert channels in mobile networks by adjusting CPU frequency., , , and . HASP@ISCA, page 2:1-2:8. ACM, (2014)Using link RTT to passively detect unapproved wireless nodes., , and . IJSN, 4 (3): 153-163 (2009)The Next Generation of Scientific-Based Risk Metrics: Measuring Cyber Maturity., and . IJCWT, 6 (3): 43-52 (2016)A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters., , and . IEEE Trans. Network and Service Management, 7 (4): 218-230 (2010)Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments., , and . GridNets, page 16. ICST, (2007)A Passive Approach to Rogue Access Point Detection., , and . GLOBECOM, page 355-360. IEEE, (2007)Securing commercial WiFi-based UAVs from common security attacks., , , , , , , and . MILCOM, page 1213-1218. IEEE, (2016)Fighting banking botnets by exploiting inherent command and control vulnerabilities., , , and . MALWARE, page 93-100. IEEE Computer Society, (2014)Remotely inferring device manipulation of industrial control systems via network behavior., , , and . LCN Workshops, page 603-610. IEEE Computer Society, (2015)