Author of the publication

Stop the Flood - Perimeter Security- and Overload- Pre-evaluation in Carrier Grade VoIP Infrastructures.

, , , and . NEW2AN, volume 7469 of Lecture Notes in Computer Science, page 359-370. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. Michael Buchmeiser University of Stuttgart

Replication data of Buchmeiser group for: "Synthetic and Structural Peculiarities of Neutral and Cationic Molybdenum Imido and Tungsten Oxo Alkylidene Complexes Bearing Weakly Coordinating N-Heterocyclic Carbenes", , , , , , and . Dataset, (2024)Related to: M. R. Buchmeiser, D. Wang, R. Schowner, L. Stöhr, F. Ziegler, S. Sen, W. Frey,; Synthetic and Structural Peculiarities of Neutral and Cationic Molybdenum Imido and Tungsten Oxo Alkylidene Complexes Bearing Weakly Coordinating N-Heterocyclic Carbenes; Eur. J. Inorg. Chem., in press (2024). doi: 10.1002/ejic.202400082.
 

Other publications of authors with the same name

Mobile SIP: An Empirical Study on SIP Retransmission Timers in HSPA 3G Networks., , , and . EUNICE, volume 8115 of Lecture Notes in Computer Science, page 78-89. Springer, (2013)Evaluating Performance Characteristics of SIP over IPv6., , , and . JNW, 2 (4): 40-50 (2007)Representative Delay Measurements (RDM): Facing the Challenge of Modern Networks., , and . EAI Endorsed Trans. Energy Web, 2 (6): e5 (2015)Representative Delay Measurements (RDM): Facing the Challenge of Modern Networks., , and . VALUETOOLS, ICST, (2014)IMS security and what we should learn from the Internet., , , , , , and . Elektrotechnik und Informationstechnik, 127 (5): 116-120 (2010)Generic access network emulation for NGN testbeds., , , , , and . TRIDENTCOM, page 43. ICST, (2008)An Architectural and Evaluative Review of Implicit and Explicit SIP Overload Handling., , , and . IJMTIE, 1 (4): 12-27 (2011)Using E-Mail SPAM DNS Blacklists for Qualifying the SPAM-over-Internet-Telephony Probability of a SIP Call., , , and . ICDS, page 254-259. IEEE Computer Society, (2009)Stop the Flood - Perimeter Security- and Overload- Pre-evaluation in Carrier Grade VoIP Infrastructures., , , and . NEW2AN, volume 7469 of Lecture Notes in Computer Science, page 359-370. Springer, (2012)