Kameswari Kotapati, Ph.D.
Affiliations: | 2008 | Pennsylvania State University, State College, PA, United States |
Area:
Computer ScienceGoogle:
"Kameswari Kotapati"Parents
Sign in to add mentorThomas F. La Porta | grad student | 2008 | Penn State | |
(Assessing security of mobile telecommunication networks.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Liu P, LaPorta TF, Kotapati K. (2009) Cellular network security Computer and Information Security Handbook. 183-203 |
Kotapati K, Liu P, La Porta TF. (2009) Evaluating MAPSec by marking attack graphs Wireless Networks. 15: 1042-1058 |
Kotapati K, Liu P, LaPorta TF. (2008) EndSec: An end-to-end message security protocol for mobile telecommunication networks 2008 Ieee International Symposium On a World of Wireless, Mobile and Multimedia Networks, Wowmom2008 |
Kotapati K, Liu P, La Porta TF. (2007) Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks? Telecommunication Systems. 35: 99-122 |
Kotapati K, Liu P, Laporta TF. (2006) CAT - A practical graph & SDL based toolkit for vulnerability assessment of 3G networks Ifip International Federation For Information Processing. 201: 158-170 |
Kotapati K, Liu P, Sun Y, et al. (2005) A taxonomy of cyber attacks on 3G networks Lecture Notes in Computer Science. 3495: 631-633 |
Kotapati K, Dandamudi SP. (1999) Buffer management in wormhole-routed torus multicomputer networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1593: 483-492 |
Kotapati K, Dandamudi SP. (1999) Buffer management in wormhole-routed torus multicomputer networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1593: 483-492 |