Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HAWAII: A Domain-based Approach for Supporting Mobility in Wide-Area Wireless Networks., , , , and . ICNP, page 283-292. IEEE Computer Society, (1999)A Detection Mechanism for SMS Flooding Attacks in Cellular Networks., , and . SecureComm, volume 106 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 76-93. Springer, (2012)Security for Telecommunications Networks, , and . Advances in Information Security Springer, (2008)Exploiting open functionality in SMS-capable cellular networks., , , and . Journal of Computer Security, 16 (6): 713-742 (2008)On the Vulnerabilities of Voronoi-Based Approaches to Mobile Sensor Deployment., , , and . IEEE Trans. Mob. Comput., 15 (12): 3114-3128 (2016)CrowdVision: A Computing Platform for Video Crowdprocessing Using Deep Learning., , , and . IEEE Trans. Mob. Comput., 18 (7): 1513-1526 (2019)A Policy-Aware Enforcement Logic for Appropriately Invoking Network Coding., , , , , and . IEEE/ACM Trans. Netw., 24 (4): 2005-2018 (2016)Distributed backpressure protocols with limited state feedback., , , , and . MILCOM, page 693-698. IEEE, (2011)An Asymmetric Protocol for Digital Cellular Communications., , , , , and . INFOCOM, page 1053-1062. IEEE Computer Society, (1995)A Taxonomy of Cyber Attacks on 3G Networks., , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 631-633. Springer, (2005)