Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name State, Radu
add a person with the name State, Radu
 

Other publications of authors with the same name

Malware behaviour analysis., , and . Journal in Computer Virology, 4 (4): 279-287 (2008)Advanced fuzzing in the VoIP space., , and . Journal in Computer Virology, 6 (1): 57-64 (2010)Improving Fuzz Testing Using Game Theory., , , , and . NSS, page 263-268. IEEE Computer Society, (2010)Implications and detection of DoS attacks in OpenFlow-based networks., , and . GLOBECOM, page 537-543. IEEE, (2014)Service management for multi-operator heterogeneous networks., , , and . GLOBECOM, page 2069-2073. IEEE, (2002)Monitoring of Spatial-Aggregated IP-Flow Records., , , and . CISIS, volume 85 of Advances in Intelligent and Soft Computing, page 117-124. Springer, (2010)Digital forensics in VoIP networks., , , and . WIFS, page 1-6. IEEE, (2010)Policy based management of wireless networks., and . Net-Con, volume 235 of IFIP Conference Proceedings, page 15-26. Kluwer, (2002)An integrated security framework for XML based management., , and . Integrated Network Management, page 587-600. IEEE, (2005)Assessing the security of VoIP Services., , , and . Integrated Network Management, page 373-382. IEEE, (2007)