2006 | ||
---|---|---|
7 | Vignesh Kumar Munirajan, Eric Cole: An agent based certificate revocation scheme for public key management in mobile and wireless adhoc networks. IMSA 2006: 132-136 | |
2005 | ||
6 | Vignesh Kumar, Eric Cole: A Packet Fair Queueing Algorithm with Controlled Compensation for Wireless TCP/IP Networks. IMSA 2005: 1-6 | |
5 | Vignesh Kumar, Eric Cole: Fair Scheduling in Wireless Networks with Controlled Compensation for Faulty Channels. International Conference on Internet Computing 2005: 203-208 | |
2004 | ||
4 | EE | Sandra Ring, Eric Cole: Volatile Memory Computer Forensics to Detect Kernel Level Compromise. ICICS 2004: 158-170 |
3 | EE | Vignesh Kumar Munirajan, Ferat Sahin, Eric Cole: Ant colony optimization based swarms: implementation for the mine detection application. SMC (1) 2004: 716-721 |
2 | EE | Sandra Ring, David Esler, Eric Cole: Self-healing mechanisms for kernel system compromises. WOSS 2004: 100-104 |
1 | EE | Sandra Ring, Eric Cole: Taking a Lesson from Stealthy Rootkits. IEEE Security & Privacy 2(4): 38-45 (2004) |
1 | David Esler | [2] |
2 | Vignesh Kumar | [5] [6] |
3 | Vignesh Kumar Munirajan | [3] [7] |
4 | Sandra Ring | [1] [2] [4] |
5 | Ferat Sahin | [3] |