Author of the publication

Extracting attack narratives from traffic datasets.

, , and . CyCon U.S., page 118-123. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the tradeoff between altruism and selfishness in MANET trust management., and . Ad Hoc Networks, 11 (8): 2217-2234 (2013)Self-Localization Algorithm for a Mobile Air Cleaner., , and . Int. J. Fuzzy Logic and Intelligent Systems, 9 (4): 321-326 (2009)Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks., and . Wireless Networks, 16 (4): 1157-1173 (2010)Modeling and Analysis of Trust Management Protocols: Altruism versus Selfishness in MANETs., , and . IFIPTM, volume 321 of IFIP Advances in Information and Communication Technology, page 141-156. Springer, (2010)Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks., , and . CSE (2), page 641-650. IEEE Computer Society, (2009)Trust-Based Intrusion Detection in Wireless Sensor Networks., , , and . ICC, page 1-6. IEEE, (2011)Trust-Based Multi-objective Optimization for Node-to-Task Assignment in Coalition Networks., , , and . ICPADS, page 372-379. IEEE Computer Society, (2013)Trust threshold based public key management in mobile ad hoc networks., , and . Ad Hoc Networks, (2016)Interaction-based Reputation Model in Online Social Networks., , and . ICISSP, page 265-272. SciTePress, (2016)Metrics and measurement of trustworthy systems., , and . MILCOM, page 1237-1242. IEEE, (2016)