![]() |
| 2006 | ||
|---|---|---|
| 7 | Vignesh Kumar Munirajan, Eric Cole: An agent based certificate revocation scheme for public key management in mobile and wireless adhoc networks. IMSA 2006: 132-136 | |
| 2005 | ||
| 6 | Vignesh Kumar, Eric Cole: A Packet Fair Queueing Algorithm with Controlled Compensation for Wireless TCP/IP Networks. IMSA 2005: 1-6 | |
| 5 | Vignesh Kumar, Eric Cole: Fair Scheduling in Wireless Networks with Controlled Compensation for Faulty Channels. International Conference on Internet Computing 2005: 203-208 | |
| 2004 | ||
| 4 | EE | Sandra Ring, Eric Cole: Volatile Memory Computer Forensics to Detect Kernel Level Compromise. ICICS 2004: 158-170 |
| 3 | EE | Vignesh Kumar Munirajan, Ferat Sahin, Eric Cole: Ant colony optimization based swarms: implementation for the mine detection application. SMC (1) 2004: 716-721 |
| 2 | EE | Sandra Ring, David Esler, Eric Cole: Self-healing mechanisms for kernel system compromises. WOSS 2004: 100-104 |
| 1 | EE | Sandra Ring, Eric Cole: Taking a Lesson from Stealthy Rootkits. IEEE Security & Privacy 2(4): 38-45 (2004) |
| 1 | David Esler | [2] |
| 2 | Vignesh Kumar | [5] [6] |
| 3 | Vignesh Kumar Munirajan | [3] [7] |
| 4 | Sandra Ring | [1] [2] [4] |
| 5 | Ferat Sahin | [3] |