Author of the publication

Intrusion Prevention System Decision Diagram in Security-as-a-Service Solutions.

, , , and . MCSS, volume 785 of Communications in Computer and Information Science, page 47-61. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Management of security in quantum cryptography., and . IEEE Communications Magazine, (2013)An analysis of the influence of the threshold parameter on the IEEE 802.11 network performance., and . WCNC, page 819-823. IEEE, (2000)An IEEE 802.11 EDCA Model with Support for Analysing Networks with Misbehaving Nodes., , and . EURASIP J. Wireless Comm. and Networking, (2010)Itinerant routing in elastic optical networks., , , , and . CoRR, (2016)Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks., , and . ADHOC-NOW, volume 5198 of Lecture Notes in Computer Science, page 176-188. Springer, (2008)Mobile routing in elastic optical networks., , and . ICCC, page 107-111. IEEE, (2014)BusySiMOn - A New Protocol for IEEE 802.11 EDCA-Based Ad-Hoc Networks with Hidden Nodes., , and . GLOBECOM, page 1-6. IEEE, (2010)An Analysis of the Back-Off Mechanism Used in IEEE 802.11 Networks., and . ISCC, page 444-449. IEEE Computer Society, (2000)A Performance Comparison of Random Access Packet-Switched Systems with an Intelligent Control Node.. ICCC, page 631-636. International Council for Computer Communication / Elsevier, (1986)A simple but accurate throughput model for IEEE 802.11 EDCA in saturation and non-saturation conditions., , and . Computer Networks, 55 (3): 622-635 (2011)