The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mehdi Nassehi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi
    Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:1-15 [Conf]
  2. Hans R. Müller, Mehdi Nassehi, Johnny W. Wong, Erwin A. Zurfluh, Werner Bux, Pitro Zafiropulo
    DQMA and CRMA: New Access Schemes for Gbit/s LANs and MANs. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1990, pp:185-191 [Conf]
  3. Andreas Wespi, Hervé Debar, Marc Dacier, Mehdi Nassehi
    Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
  4. Willibald A. Doeringer, Günter Karjoth, Mehdi Nassehi
    Routing on longest-matching prefixes. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1996, v:4, n:1, pp:86-97 [Journal]
  5. Willibald A. Doeringer, Günter Karjoth, Mehdi Nassehi
    Corrections to ``Routing on longest-matching prefixes''. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1997, v:5, n:4, pp:600- [Journal]

Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002