Author of the publication

How to Secure Bluetooth-Based Pico Networks.

, , and . SAFECOMP, volume 4680 of Lecture Notes in Computer Science, page 209-223. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks., , , and . NDSS, The Internet Society, (2012)State Transition Analysis: A Rule-Based Intrusion Detection Approach., , and . IEEE Trans. Software Eng., 21 (3): 181-199 (1995)Model checking invariant security properties in OpenFlow., , , , and . ICC, page 1974-1979. IEEE, (2013)Operator-Defined Reconfigurable Network OS for Software-Defined Networks., , , , , and . IEEE/ACM Trans. Netw., 27 (3): 1206-1219 (2019)Inside risks - Reflections on Conficker.. Commun. ACM, 52 (10): 23-24 (2009)Cyber defense technology networking and evaluation., , , , , , , , , and 14 other author(s). Commun. ACM, 47 (3): 58-61 (2004)Detecting money-stealing apps in alternative Android markets., , , and . ACM Conference on Computer and Communications Security, page 1034-1036. ACM, (2012)AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks., , , and . ACM Conference on Computer and Communications Security, page 413-424. ACM, (2013)Rosemary: A Robust, Secure, and High-performance Network Operating System., , , , , , , , and . ACM Conference on Computer and Communications Security, page 78-89. ACM, (2014)Gaussian process learning for cyber-attack early warning., , and . Statistical Analysis and Data Mining, 3 (1): 56-68 (2010)