Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Ensemble-Based Machine Learning Model for Forecasting Network Traffic in VANET., and . IEEE Access, (2023)Secure Route Optimization for MIPv6 Using Enhanced CGA and DNSSEC., , and . IEEE Syst. J., 7 (3): 351-362 (2013)Discovering the Architecture of Geo-Located Web Services for Next Generation Mobile Networks., and . IEEE Trans. Mob. Comput., 5 (7): 784-798 (2006)A New Seamless Method to Support CDMA2000/WLAN Vertical Handover., , and . CCECE, page 214-218. IEEE, (2006)Client Puzzles Based on Quasi Partial Collisions Against DoS Attacks in UMTS., , and . VTC Fall, page 1-5. IEEE, (2006)A Mathematical Model for the Admission Control Problem in MPLS Networks with End-to-End delay guarantees., and . ICCCN, page 1193-1197. IEEE, (2007)A new hybrid constraint-based approach for 3G network planning., and . IEEE Communications Letters, 8 (5): 277-279 (2004)Optimization of Handover Performance for Fmipv6., , and . INTELLCOMM, volume 190 of IFIP, page 169-178. Springer, (2005)A Secure Protocol for Mobile Agents in Hostile Environment., , and . MATA, volume 3744 of Lecture Notes in Computer Science, page 192-202. Springer, (2005)Using Mobile Agents for Managing Control and Alarms in Urban Infrastructure., , and . MATA, volume 2164 of Lecture Notes in Computer Science, page 195-208. Springer, (2001)