Author of the publication

A testbed implementation of hybrid decision model based seamless lightweight vertical handover.

, , and . ICC, page 1-6. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks., , , and . Netw. Protoc. Algorithms, 10 (1): 83-108 (2018)Security threats in Bluetooth technology., , , and . Comput. Secur., (2018)Federated 3GPP Mobile Edge Computing Systems: A Transparent Proxy for Third Party Authentication with Application Mobility Support., , , , and . CoRR, (2021)Towards an Attention-Based Accurate Intrusion Detection Approach., , , and . QSHINE, volume 402 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 261-279. Springer, (2021)An Integrated Inspection and Visualization Tool for Accurate Android Collusive Malware Detection., , and . NSysS, page 107-114. ACM, (2020)Performance evaluation of multihomed NEMO., , and . ICC, page 5429-5433. IEEE, (2012)A novel scheduling and queue management scheme for multi-band mobile routers., , and . ICC, page 3787-3791. IEEE, (2013)Signaling Cost Analysis of Mobility Protocols Using City Section Mobility Model., and . CSA, page 1-6. IEEE, (2009)Comparison of NEMO Schemes in Proxy Mobile IPv6 Domain., , , and . GLOBECOM, page 1-6. IEEE, (2016)Sequencing System Calls for Effective Malware Detection in Android., , and . GLOBECOM, page 1-7. IEEE, (2018)