2000 |
5 | | Andreas Wespi,
Hervé Debar,
Marc Dacier,
Mehdi Nassehi:
Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior.
Journal of Computer Security 8(2/3): (2000) |
1998 |
4 | EE | Hervé Debar,
Marc Dacier,
Mehdi Nassehi,
Andreas Wespi:
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior.
ESORICS 1998: 1-15 |
1997 |
3 | EE | Willibald A. Doeringer,
Günter Karjoth,
Mehdi Nassehi:
Corrections to ``Routing on longest-matching prefixes''.
IEEE/ACM Trans. Netw. 5(4): 600 (1997) |
1996 |
2 | EE | Willibald A. Doeringer,
Günter Karjoth,
Mehdi Nassehi:
Routing on longest-matching prefixes.
IEEE/ACM Trans. Netw. 4(1): 86-97 (1996) |
1990 |
1 | | Hans R. Müller,
Mehdi Nassehi,
Johnny W. Wong,
Erwin A. Zurfluh,
Werner Bux,
Pitro Zafiropulo:
DQMA and CRMA: New Access Schemes for Gbit/s LANs and MANs.
INFOCOM 1990: 185-191 |