Search results for: Thomas Dübendorfer
Lecture Notes in Computer Science > Detection of Intrusions and Malware & Vulnerability Assessment > Deployment Scenarios > 181-194
Lecture Notes in Computer Science > Active and Programmable Networks > Programmable Networks and Heterogeneity > 1-12
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Vulnerability Assessment and Exploit Analysis > 103-122
Journal of Network and Computer Applications > 2007 > 30 > 3 > 841-857
Wireless Networks > 2004 > 10 > 6 > 689-700