Search


Current filters:
Start a new search
Add filters:

Use filters to refine the search results.


Results 41-50 of 93 (Search time: 0.003 seconds).
Item hits:
PreviewIssue DateTitleAuthor(s)
2021Counting Candy Crush configurationsHamilton, A.; Nguyen, G.T.; Roughan, M.
2017MGtoolkit: a python package for implementing metagraphsRanathunga, D.; Nguyen, H.; Roughan, M.
2018Clear as MUD: Generating, validating and applying IoT behavioral profilesHamza, A.; Ranathunga, D.; Gharakheili, H.H.; Roughan, M.; Sivaraman, V.; ACM SIGCOMM Workshop on IoT Security and Privacy (IoT S&P) (20 Aug 2018 : Budapest)
2007Topology reconstruction and characterisation of wireless ad hoc networksArnold, J.; Bean, N.; Kraetzl, M.; Roughan, M.; Sorell, M.; Thompson, J.; Andonovic, I.; IEEE International Conference on Communications (2007 : Glasgow, Scotland)
2008On the correlation of internet packet lossesNguyen, H.; Roughan, M.; Australasian Telecommunication Networks and Applications Conference (2008 : Adelaide, Australia)
2013STRIP: privacy-preserving vector-based routingHenecka, W.; Roughan, M.; Fu, X.; Hilt, V.; Wolf, T.; Zhang, L.; Zhang, Z.; 21st IEEE International Conference on Network Protocols (ICNP) (7 Oct 2013 - 10 Oct 2013 : Gottingen, Germany)
2008GATEway: Symbiotic inter-domain traffic engineeringRoughan, M.; Zhang, Y.; International Workshop on Game Theory in Communication Networks (2nd : 2008 : Athens, Greece)
2017Controlled synthesis of traffic matricesTune, P.; Roughan, M.
2007Node localisation in wireless ad hoc networksArnold, J.; Bean, N.; Kraetzl, M.; Roughan, M.; Dadej, A.; ICON 2007: IEEE International Conference on Networks (15th : 2007 : Adelaide, Australia)
2015Identifying the missing aspects of the ANSI/ISA best practices for security policyRanathunga, D.; Roughan, M.; Kernick, P.; Falkner, N.; Nguyen, H.; 1st ACM Workshop on Cyber-Physical System Security (CPSS) (14 Apr 2015 : Singapore, Republic of Singapore)