Author of the publication

An Investigation of R-Chunk Detector Generation on Higher Alphabets.

, , and . GECCO (1), volume 3102 of Lecture Notes in Computer Science, page 299-307. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks., , , , and . NetSoft, page 347-348. IEEE, (2016)Security Analysis of Software Defined Networking Architectures: PCE, 4D and SANE., , , and . AINTEC, page 15. ACM, (2014)Exploring impact of time management services on HLA-based Petri Nets Simulation Engine., , and . Simul. Pr. Theory, 9 (3-5): 143-166 (2002)Intrusion detection in VANETs through verification of vehicle movement data., , and . VNC, page 166-173. IEEE, (2010)Towards Certificate-Based Authentication for Future Mobile Communications., , , , , , , and . Wireless Personal Communications, 29 (3-4): 283-301 (2004)Selecting the best communication service in future network architectures., , and . Kaleidoscope, page 1-8. IEEE, (2013)Towards a Holistic Privacy Engineering Approach for Smart Grid Systems., and . TrustCom, page 234-241. IEEE Computer Society, (2011)STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks., , , and . ARES, page 310-317. IEEE Computer Society, (2007)Interworking von UMTS und LAN: Eine sicherheitstechnische Betrachtung., , and . DFN-Arbeitstagung über Kommunikationsnetze, volume P-55 of LNI, page 413-431. GI, (2004)Short paper: Experimental analysis of misbehavior detection and prevention in VANETs., , , , and . VNC, page 198-201. IEEE, (2013)