Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SIP Flooding Attack Detection Using a Trust Model and Statistical Algorithms., , , and . J. Inf. Process., 22 (2): 118-129 (2014)Obtaining Sensing Data Based on the Proximity of Sensor Nodes., , , , and . SAINT, page 409-412. IEEE Computer Society, (2008)Inter-device Communication Paradigm: Requirements Analysis for Its Security Mechanisms., , and . SAINT, page 345-348. IEEE Computer Society, (2008)Nazca: A Geographic Location Service., , , , , and . SAINT Workshops, page 51. IEEE Computer Society, (2007)A Generic API for Retrieving Human-Oriented Information from Social Network Services., , , , and . SAINT Workshops, page 33. IEEE Computer Society, (2007)Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software., , and . SAINT Workshops, page 31. IEEE Computer Society, (2007)Design of Geographically Aggregatable Address and Routing Toward Location Based Multicast., , and . AINA Workshops, page 1307-1312. IEEE Computer Society, (2013)A Proposal for Anomaly Traffic Detection in the IP Multimedia Subsystem Using Tanimoto Distance and a Modified Moving Average., , and . SAINT, page 278-283. IEEE Computer Society, (2012)Context-aware content-provision service for shopping malls based on ubiquitous service-oriented network framework and authentication and access control agent framework., , , , , , and . CCNC, page 1330-1331. IEEE, (2006)Trust-based SPIT detection by using call duration and social reliability., , , and . APCC, page 98-103. IEEE, (2013)