Search

Your search keyword '"Fallah, Mehran S."' showing total 31 results

Search Constraints

Start Over You searched for: Author "Fallah, Mehran S." Remove constraint Author: "Fallah, Mehran S."
31 results on '"Fallah, Mehran S."'

Search Results

2. S-Restricted Compositions Revisited

3. Run-Time Verification for Observational Determinism Using Dynamic Program Slicing

6. Is Cryptyc Able to Detect Insider Attacks?

14. Designing programmable parallel LFSR using parallel prefix trees.

23. A nonmonotonic modal authorization logic for pervasive computing.

25. Stimulating Cooperation in MANETs Using Game Theory.

26. Typing secure implementation of authentication protocols in environments with compromised principals.

27. TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks.

28. A Game-based Sybil-resistant Strategy for Reputation Systems in Self-organizing MANETs.

30. A Game-theoretic Cooperation Stimulus Routing Protocol in MANETs.

31. A Framework for the Analysis of Denial of Service Attacks.

Catalog

Books, media, physical & digital resources