Sledovat
Martin Reed
Martin Reed
E-mailová adresa ověřena na: essex.ac.uk - Domovská stránka
Název
Citace
Citace
Rok
Opnet modeler and ns-2: Comparing the accuracy of network simulators for packet-level analysis using a network testbed
GF Lucio, M Paredes-Farrera, E Jammeh, M Fleury, MJ Reed
wseas transactions on computers 2 (3), 700-707, 2003
2362003
IP over ICN-the better IP?
D Trossen, MJ Reed, J Riihijärvi, M Georgiades, N Fotiou, G Xylomenos
2015 European conference on networks and communications (EuCNC), 413-417, 2015
832015
Identification of discrete Volterra series using maximum length sequences
MJ Reed, MOJ Hawksford
IEE Proceedings-Circuits, Devices and Systems 143 (5), 241-248, 1996
631996
Methodologies for detecting DoS/DDoS attacks against network servers
M Alenezi, MJ Reed
ICSNC 2012, 103, 2012
532012
Hierarchical machine learning for IoT anomaly detection in SDN
P Amangele, MJ Reed, M Al-Naday, N Thomos, M Nowak
2019 International Conference on Information Technologies (InfoTech), 1-4, 2019
512019
Enabling efficient source and path verification via probabilistic packet marking
B Wu, K Xu, Q Li, Z Liu, YC Hu, MJ Reed, M Shen, F Yang
2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), 1-10, 2018
492018
Stateless multicast switching in software defined networks
MJ Reed, M Al-Naday, N Thomos, D Trossen, G Petropoulos, S Spirou
2016 IEEE International Conference on Communications (ICC), 1-7, 2016
462016
BDS: A centralized near-optimal overlay network for inter-datacenter data replication
Y Zhang, J Jiang, K Xu, X Nie, MJ Reed, H Wang, G Yao, M Zhang, ...
Proceedings of the Thirteenth EuroSys Conference, 1-14, 2018
452018
Authenticated secret key generation in delay-constrained wireless systems
M Mitev, A Chorti, M Reed, L Musavian
EURASIP Journal on Wireless Communications and Networking 2020, 1-29, 2020
432020
Securing SDN-controlled IoT networks through edge blockchain
J Hu, M Reed, N Thomos, MF AI-Naday, K Yang
IEEE Internet of Things Journal 8 (4), 2102-2115, 2020
422020
Attack graph-based risk assessment and optimisation approach
M Alhomidi, M Reed
International Journal of Network Security & Its Applications 6 (3), 31, 2014
352014
Information resilience: source recovery in an information-centric network
MF Al-Naday, MJ Reed, D Trossen, K Yang
IEEE network 28 (3), 36-42, 2014
342014
Efficient implementation of the Volterra filter
MJ Reed, MOJ Hawksford
IEE Proceedings-Vision, Image and Signal Processing 147 (2), 109-114, 2000
332000
Confidentiality of a selectively encrypted H. 264 coded video bit-stream
MN Asghar, M Ghanbari, M Fleury, MJ Reed
Journal of Visual Communication and Image Representation 25 (2), 487-498, 2014
292014
Attack graphs representations
MA Alhomidi, MJ Reed
2012 4th Computer Science and Electronic Engineering Conference (CEEC), 83-88, 2012
292012
Finding the minimum cut set in attack graphs using genetic algorithms
M Alhomidi, M Reed
2013 International Conference on Computer Applications Technology (ICCAT), 1-6, 2013
272013
Practical modeling of nonlinear audio systems using the volterra series
MJ Reed, MJ Hawksford
Audio Engineering Society Convention 100, 1996
261996
SLA formulation for squeezed protection in elastic optical networks considering the modulation format
KDR Assis, RC Almeida Jr, H Waldman, AF Santos, MS Alencar, MJ Reed, ...
Journal of optical communications and networking 11 (5), 202-212, 2019
252019
Sufficient encryption based on entropy coding syntax elements of H. 264/SVC
MN Asghar, M Ghanbari, M Fleury, MJ Reed
Multimedia Tools and Applications 74, 10215-10241, 2015
252015
Optimized hash for network path encoding with minimized false positives
L Carrea, A Vernitski, M Reed
Computer networks 58, 180-191, 2014
252014
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20