Author of the publication

Combining Multiple Intrusion Detection and Response Technologies in an Active Networking Based Architecture.

, , and . DFN-Arbeitstagung über Kommunikationsnetze, volume P-44 of LNI, page 153-165. GI, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploration of adaptive beaconing for efficient intervehicle safety communication., , , , and . IEEE Network, 24 (1): 14-19 (2010)Multilateral sichere Mobilitätsunterstützung für IP-Netze: Paketfilter- und Tunnelkonfiguration., , and . Praxis der Informationsverarbeitung und Kommunikation, 24 (3): 172-179 (2001)Effiziente Authentisierung und Schlüsselverwaltung in Hochleistungsnetzen.. Universität Karlsruhe, (1998)Security analysis and concept for the multicast-based handover support architecture MOMBASA., , , and . GLOBECOM, page 2201-2207. IEEE, (2004)An approach for selective beacon forwarding to improve cooperative awareness., , , , and . VNC, page 182-188. IEEE, (2010)Security in fixed and wireless networks - an introduction to securing data communications.. Wiley, (2003)BCBS: An Efficient Load Balancing Strategy for Cooperative Overlay Live-Streaming., , and . ICC, page 304-309. IEEE, (2006)Supertask: Maximizing runnable-level parallelism in AUTOSAR applications., , , , , , , and . DATE, page 25-30. IEEE, (2016)Automatic source code decomposition for privilege separation., , and . SoftCOM, page 1-6. IEEE, (2016)Cooperative Passive Coherent Location: A Promising 5G Service to Support Road Safety., , , , , , , , , and 1 other author(s). IEEE Communications Magazine, 57 (9): 86-92 (2019)