Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peer-to-Peer Adaptive Forward Error Correction in Live Video Streaming over Wireless Mesh Network., and . WWIC, volume 8458 of Lecture Notes in Computer Science, page 109-121. Springer, (2014)Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3., , , , and . CoRR, (2017)Adaptive video protection in large scale peer-to-peer video streaming over mobile wireless mesh networks., , , and . Int. J. Communication Systems, 29 (18): 2580-2603 (2016)PAtt: Physics-based Attestation of Control Systems., , , , , , , , and . RAID, page 165-180. USENIX Association, (2019)Efficient P2P Live Video Streaming Over Hybrid WMNs Using Random Network Coding., , , , , and . Wireless Personal Communications, 80 (4): 1761-1789 (2015)Unequal Importance Multipath Video Streaming for Wireless Networks., , , and . JMPT, 7 (3): 91-101 (2016)Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures., , and . ARES, page 80:1-80:10. ACM, (2019)Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3., , , , and . CPS-SPC@CCS, page 93-102. ACM, (2017)HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems., and . CPS-SPC@CCS, page 103-111. ACM, (2016)State-aware anomaly detection for industrial control systems., , , , and . SAC, page 1620-1628. ACM, (2018)