default search action
Michael Liljenstam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c27]Arun Raghuramu, Michael Liljenstam, Sonika Ujjwal, Utku Gülen, Greg Phillips, Zakaria Laaroussi, Leyli Karaçay:
Network Digital Twins: A Threat Analysis. ICC Workshops 2023: 733-739 - 2022
- [c26]Jakob Sternby, Björn Johansson, Michael Liljenstam:
Neural Network Model Obfuscation through Adversarial Training. CCGRID 2022: 782-789 - [c25]Zakaria Laaroussi, Elif Ustundag Soykan, Michael Liljenstam, Utku Gülen, Leyli Karaçay, Emrah Tomur:
On the security of 6G use cases: Threat Analysis of 'All-Senses Meeting'. CCNC 2022: 1-6 - 2020
- [c24]Jakob Sternby, Erik Thormarker, Michael Liljenstam:
Anomaly Detection Forest. ECAI 2020: 1507-1514
2010 – 2019
- 2015
- [c23]Prajwol Kumar Nakarmi, Oscar Ohlsson, Michael Liljenstam:
An Air Interface Signaling Protection Function for Mobile Networks: GSM Experiments and Beyond. TrustCom/BigDataSE/ISPA (1) 2015: 1192-1198 - 2012
- [c22]James Mitchell, Eamonn O'Neill, Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, Per Johansson:
Limitations of scanned human copresence encounters for modelling proximity-borne malware. COMSNETS 2012: 1-10
2000 – 2009
- 2009
- [c21]Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, Per Johansson:
Defending Mobile Phones from Proximity Malware. INFOCOM 2009: 1503-1511 - [c20]Yue Li, Michael Liljenstam, Jason Liu:
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform. PADS 2009: 54-63 - 2006
- [j5]Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier:
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version). Simul. 82(1): 43-59 (2006) - 2005
- [c19]David M. Nicol, Michael Liljenstam:
Models and Analysis of Active Worm Defense. MMM-ACNS 2005: 38-53 - [c18]Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier:
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises. PADS 2005: 119-128 - [c17]David M. Nicol, Michael Liljenstam, Jason Liu:
Advanced concepts in large-scale network simulation. WSC 2005: 153-166 - 2004
- [c16]Michael Liljenstam, David M. Nicol:
Comparing Passive and Active Worm Defenses. QEST 2004: 18-27 - [c15]Michael Liljenstam, David M. Nicol:
On-Demand Computation of Policy Based Routes for Large-Scale Network Simulation. WSC 2004: 215-223 - 2003
- [c14]David M. Nicol, Michael Liljenstam, Jason Liu:
Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure. Computer Performance Evaluation / TOOLS 2003: 1-10 - [c13]Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray:
Simulating realistic network worm traffic for worm warning system design and testing. WORM 2003: 24-33 - [c12]David M. Nicol, Jason Liu, Michael Liljenstam, Guanhua Yan:
Simulation of large scale networks I: simulation of large-scale networks using SSF. WSC 2003: 650-657 - [c11]Michael Liljenstam, Jason Liu, David M. Nicol:
Simulation of large scale networks II: development of an internet backbone topology for large-scale network simulations. WSC 2003: 694-702 - 2002
- [j4]Michael Liljenstam, Andrew T. Ogielski:
Crossover scaling effects in aggregated TCP traffic with congestion losses. Comput. Commun. Rev. 32(5): 89-100 (2002) - [c10]Michael Liljenstam, Yougu Yuan, Brian J. Premore, David M. Nicol:
A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations. MASCOTS 2002: 109-116 - 2001
- [j3]Michael Liljenstam, Robert Rönngren, Rassul Ayani:
MobSim++: Parallel Simulation of Personal Communication Networks. IEEE Distributed Syst. Online 2(2) (2001) - [j2]Michael Liljenstam, Robert Rönngren, Rassul Ayani:
Partitioning WCN Models for Parallel Simulation of Radio Resource Management. Wirel. Networks 7(3): 307-324 (2001) - [c9]Jason Liu, David M. Nicol, L. Felipe Perrone, Michael Liljenstam:
Wireless: towards high performance modeling of the 802.11 Wireless protocol. WSC 2001: 1315-1320
1990 – 1999
- 1999
- [c8]Robert Rönngren, Michael Liljenstam:
On Event Ordering in Parallel Discrete Event Simulation. Workshop on Parallel and Distributed Simulation 1999: 38-45 - 1998
- [c7]Michael Liljenstam, Rassul Ayani:
Interference Radius in PCS Radio Resource Management Simulations. WSC 1998: 1629-1640 - 1997
- [c6]Michael Liljenstam, Rassul Ayani:
Partitioning PCS for Parallel Simulation. MASCOTS 1997: 38- - 1996
- [c5]Robert Rönngren, Michael Liljenstam, Rassul Ayani, Johan Montagnat:
A comparative study of state saving mechanisms for time warp synchronized parallel discrete event simulation. Annual Simulation Symposium 1996: 5-14 - [c4]Michael Liljenstam, Rassul Ayani:
A Model for Parallel Simulation of Mobile Telecommunication Systems. MASCOTS 1996: 168-173 - [c3]Robert Rönngren, Michael Liljenstam, Rassul Ayani, Johan Montagnat:
Transparent Incremental State Saving in Time Warp Parallel Discrete Event Simulation. Workshop on Parallel and Distributed Simulation 1996: 70-77 - 1995
- [j1]Rassul Ayani, Yuri Ismailov, Michael Liljenstam, Adrian Popescu, Hassan Rajaei, Robert Rönngren:
Modeling and Simulation of a High Speed LAN. Simul. 64(1): 7-14 (1995) - [c2]Sven Sköld, Robert Rönngren, Michael Liljenstam, Rassul Ayani:
Parallel Simulation of Mobile Communication Networks Using Time Warp. EUROSIM 1995: 559-564 - 1994
- [c1]Robert Rönngren, Hassan Rajaei, Adrian Popescu, Michael Liljenstam, Yuri Ismailov, Rassul Ayani:
Parallel simulation of a high speed LAN. PADS 1994: 132-138
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-30 20:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint