Martin Reed
Martin Reed
Senior Lecturer, University of Essex
Verified email at essex.ac.uk - Homepage
Title
Cited by
Cited by
Year
Opnet modeler and ns-2: Comparing the accuracy of network simulators for packet-level analysis using a network testbed
GF Lucio, M Paredes-Farrera, E Jammeh, M Fleury, MJ Reed
wseas transactions on computers 2 (3), 700-707, 2003
2162003
Identification of discrete Volterra series using maximum length sequences
MJ Reed, MOJ Hawksford
IEE Proceedings-Circuits, Devices and Systems 143 (5), 241-248, 1996
641996
IP over ICN-the better IP?
D Trossen, MJ Reed, J Riihijärvi, M Georgiades, N Fotiou, G Xylomenos
2015 European conference on networks and communications (EuCNC), 413-417, 2015
552015
Methodologies for detecting DoS/DDoS attacks against network servers
M Alenezi, MJ Reed
The Seventh International Conference on Systems and Networks Communications …, 2012
312012
Efficient implementation of the Volterra filter
MJ Reed, MOJ Hawksford
IEE Proceedings-Vision, Image and Signal Processing 147 (2), 109-114, 2000
302000
Stateless multicast switching in software defined networks
MJ Reed, M Al-Naday, N Thomos, D Trossen, G Petropoulos, S Spirou
2016 IEEE International Conference on Communications (ICC), 1-7, 2016
282016
Network simulators: A developer’s perspective
M Małowidzki
Proc. Int. Symp. Perform. Eval. Comput. Telecommun. Syst. SPECTS’04, 2004
252004
Bandwidth protection in MPLS networks using p-cycle structure
J Kang, MJ Reed
Fourth International Workshop on Design of Reliable Communication Networks …, 2003
242003
Information resilience: source recovery in an information-centric network
MF Al-Naday, MJ Reed, D Trossen, K Yang
IEEE network 28 (3), 36-42, 2014
232014
Practical modeling of nonlinear audio systems using the volterra series
MJ Reed, MJ Hawksford
Audio Engineering Society Convention 100, 1996
231996
Traffic engineering for information-centric networks
MJ Reed
2012 IEEE International Conference on Communications (ICC), 2660-2665, 2012
222012
Scalability of information centric networking using mediated topology management
BA Alzahrani, MJ Reed, J Riihijärvi, VG Vassilakis
Journal of Network and Computer Applications 50, 126-133, 2015
202015
Confidentiality of a selectively encrypted H. 264 coded video bit-stream
MN Asghar, M Ghanbari, M Fleury, MJ Reed
Journal of Visual Communication and Image Representation 25 (2), 487-498, 2014
192014
Optimized hash for network path encoding with minimized false positives
L Carrea, A Vernitski, M Reed
Computer networks 58, 180-191, 2014
192014
Risk assessment and analysis through population-based attack graph modelling
M Alhomidi, M Reed
World Congress on Internet Security (WorldCIS-2013), 19-24, 2013
182013
Finding the minimum cut set in attack graphs using genetic algorithms
M Alhomidi, M Reed
2013 International Conference on Computer Applications Technology (ICCAT), 1-6, 2013
182013
Optimising rule order for a packet filtering firewall
I Mothersole, MJ Reed
2011 Conference on Network and Information Systems Security, 1-6, 2011
182011
Uniform dos traceback
MN Alenezi, MJ Reed
Computers & security 45, 17-26, 2014
172014
Mitigating brute-force attacks on Bloom-filter based forwarding
BA Alzahrani, VG Vassilakis, MJ Reed
2013 Conference on Future Internet Communications (CFIC), 1-7, 2013
172013
Attack graphs representations
MA Alhomidi, MJ Reed
2012 4th Computer Science and Electronic Engineering Conference (CEEC), 83-88, 2012
172012
The system can't perform the operation now. Try again later.
Articles 1–20