Martin Reed
Martin Reed
Vahvistettu sähköpostiosoite verkkotunnuksessa essex.ac.uk - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
Opnet modeler and ns-2: Comparing the accuracy of network simulators for packet-level analysis using a network testbed
GF Lucio, M Paredes-Farrera, E Jammeh, M Fleury, MJ Reed
wseas transactions on computers 2 (3), 700-707, 2003
2212003
IP over ICN-the better IP?
D Trossen, MJ Reed, J Riihijärvi, M Georgiades, N Fotiou, G Xylomenos
2015 European conference on networks and communications (EuCNC), 413-417, 2015
652015
Identification of discrete Volterra series using maximum length sequences
MJ Reed, MOJ Hawksford
IEE Proceedings-Circuits, Devices and Systems 143 (5), 241-248, 1996
651996
Methodologies for detecting DoS/DDoS attacks against network servers
M Alenezi, MJ Reed
The Seventh International Conference on Systems and Networks Communications …, 2012
342012
Stateless multicast switching in software defined networks
MJ Reed, M Al-Naday, N Thomos, D Trossen, G Petropoulos, S Spirou
2016 IEEE International Conference on Communications (ICC), 1-7, 2016
322016
Efficient implementation of the Volterra filter
MJ Reed, MOJ Hawksford
IEE Proceedings-Vision, Image and Signal Processing 147 (2), 109-114, 2000
302000
Network simulators: A developer’s perspective
M Małowidzki
Proc. Int. Symp. Perform. Eval. Comput. Telecommun. Syst. SPECTS’04, 2004
272004
Information resilience: source recovery in an information-centric network
MF Al-Naday, MJ Reed, D Trossen, K Yang
IEEE network 28 (3), 36-42, 2014
242014
Bandwidth protection in MPLS networks using p-cycle structure
J Kang, MJ Reed
Fourth International Workshop on Design of Reliable Communication Networks …, 2003
242003
Practical modeling of nonlinear audio systems using the volterra series
MJ Reed, MJ Hawksford
Audio Engineering Society Convention 100, 1996
241996
Traffic engineering for information-centric networks
MJ Reed
2012 IEEE International Conference on Communications (ICC), 2660-2665, 2012
232012
Scalability of information centric networking using mediated topology management
BA Alzahrani, MJ Reed, J Riihijärvi, VG Vassilakis
Journal of Network and Computer Applications 50, 126-133, 2015
222015
Confidentiality of a selectively encrypted H. 264 coded video bit-stream
MN Asghar, M Ghanbari, M Fleury, MJ Reed
Journal of Visual Communication and Image Representation 25 (2), 487-498, 2014
222014
Risk assessment and analysis through population-based attack graph modelling
M Alhomidi, M Reed
World Congress on Internet Security (WorldCIS-2013), 19-24, 2013
202013
Attack graphs representations
MA Alhomidi, MJ Reed
2012 4th Computer Science and Electronic Engineering Conference (CEEC), 83-88, 2012
202012
Sufficient encryption based on entropy coding syntax elements of H. 264/SVC
MN Asghar, M Ghanbari, M Fleury, MJ Reed
Multimedia Tools and Applications 74 (23), 10215-10241, 2015
192015
Optimized hash for network path encoding with minimized false positives
L Carrea, A Vernitski, M Reed
Computer networks 58, 180-191, 2014
192014
BDS: a centralized near-optimal overlay network for inter-datacenter data replication
Y Zhang, J Jiang, K Xu, X Nie, MJ Reed, H Wang, G Yao, M Zhang, ...
Proceedings of the Thirteenth EuroSys Conference, 1-14, 2018
182018
Finding the minimum cut set in attack graphs using genetic algorithms
M Alhomidi, M Reed
2013 International Conference on Computer Applications Technology (ICCAT), 1-6, 2013
182013
Optimising rule order for a packet filtering firewall
I Mothersole, MJ Reed
2011 Conference on Network and Information Systems Security, 1-6, 2011
182011
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20