Author of the publication

ISCP: design and implementation of an inter-domain security management agent (SMA) coordination protocol.

, , , , , , and . NOMS, page 565-578. IEEE, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion-detection for incident-response, using a military battlefield-intelligence process., , , , , , and . Computer Networks, 34 (4): 671-697 (2000)Building Security-Aware Applications on Celestial Network Security Management Infrastructure., , , , and . International Conference on Internet Computing, page 219-226. CSREA Press, (2000)DecIdUouS: Decentralized Source Identification for Network-Based Intrusions., , , , , , , , , and . Integrated Network Management, page 701-714. IEEE, (1999)IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution., , , , , , and . POLICY, volume 1995 of Lecture Notes in Computer Science, page 39-56. Springer, (2001)An application-oriented error control scheme for high-speed networks., and . IEEE/ACM Trans. Netw., 4 (5): 669-683 (1996)Report from the joint SIGGRAPH/SIGCOMM workshop on graphics and networking., , , and . Computer Communication Review, 21 (2): 17-25 (1991)Intrusion Detection for an On-Going Attack., , , and . Recent Advances in Intrusion Detection, (1999)Design of a key agile cryptographic system for OC-12c rate ATM., , , , and . NDSS, page 17-30. IEEE Computer Society, (1995)Efficient Techniques for Two-Layer Coding of Video Sequences., , , and . ICIP (1), page 253-257. IEEE Computer Society, (1994)A Two-Level Flow Control Scheme for High Speed Networks., and . J. High Speed Networks, 3 (3): 261-284 (1994)