Author of the publication

A Study of Shared Buffer Memory Segmentation for Packet Switched Networks.

, , and . AICT/ICIW, page 55. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PageRank in malware categorization., , , and . RACS, page 291-295. ACM, (2015)DL-Droid: Deep learning based android malware detection using real devices., , and . CoRR, (2019)An investigation into the design of high-performance shared buffer architectures based on FPGA technology with embedded memory., and . FPT, page 461-464. IEEE, (2004)A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems., , , , and . ISGT, page 1-5. IEEE, (2020)SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection., , , and . IEEE Trans. Inf. Forensics Secur., 8 (3): 500-509 (2013)Quality of service analysis of a wireless ATM network access point., , , and . ICC, page 226-230. IEEE, (1999)MobiQ: A modular Android application for collecting social interaction, repeated survey, GPS and photographic data., , , , , , , , , and 1 other author(s). SoftwareX, (2018)OSCIDS: An Ontology based SCADA Intrusion Detection Framework., , and . SECRYPT, page 327-335. SciTePress, (2016)Detecting packed executables using steganalysis., , , and . EUVIP, page 1-5. IEEE, (2014)PageRank in Malware Categorization., , , and . CoRR, (2016)