![]() |
| 2007 | ||
|---|---|---|
| 5 | Victor A. Clincy, Padmaja Mudiraj: A Mobile IPv6 Study. ICWN 2007: 274-279 | |
| 2006 | ||
| 4 | Victor A. Clincy, Padmaja Mudiraj: Wireless Intrusion Detection Technologies to Determine Friend or Foe. ICWN 2006: 84- | |
| 3 | Victor A. Clincy, Padmaja Mudiraj: Tor - A Tool to Disguise Internet Communications. International Conference on Internet Computing 2006: 387-392 | |
| 2005 | ||
| 2 | Victor A. Clincy, Padmaja Mudiraj: A Defense-In-Depth Approach to Secure Wireless LANs. ICWN 2005: 99-104 | |
| 1 | Victor A. Clincy, Nael Abu-Halaweh, Padmaja Mudiraj: Traffic Analysis of a Multimedia Network. IMSA 2005: 337-340 | |
| 1 | Nael Abu-Halaweh | [1] |
| 2 | Victor A. Clincy | [1] [2] [3] [4] [5] |