Author of the publication

On Mobile Viruses Exploiting Messaging and Bluetooth Services.

, and . SecureComm, page 1-10. IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ML for RT: Priority Assignment Using Machine Learning., , , , and . RTAS, page 118-130. IEEE, (2021)An Approach to Checking Consistency in Multimedia Synchronization Constraints., and . IEEE International Conference on Multimedia and Expo (III), page 1671-1674. IEEE Computer Society, (2000)A New Scheduling Scheme for Multicast True VoD Service., and . IEEE Pacific Rim Conference on Multimedia, volume 2195 of Lecture Notes in Computer Science, page 708-715. Springer, (2001)Analysis and implementation of hybrid switching., and . ISCA, page 211-219. ACM, (1995)A Fast and Memory-Efficient Trie Structure for Name-Based Packet Forwarding., , , and . ICNP, page 302-312. IEEE Computer Society, (2018)EMS: Efficient Multicast Streaming Scheme for Multicasting within Wi-Fi Hotspot., and . ICNP, page 386-395. IEEE Computer Society, (2015)LibreCAN: Automated CAN Message Translator., , , , , and . CCS, page 2283-2300. ACM, (2019)Checkpointing and Rollback Recovery in a Distributed System Using Common Time Base., and . SRDS, page 13-21. IEEE Computer Society, (1988)Smooth Handoff with Enhanced Packet Buffering-and-Forwarding in Wireless/Mobile Networks., and . QSHINE, page 39. IEEE Computer Society, (2005)Coverage Performance of Aerial-Terrestrial HetNets., , , , and . VTC Spring, page 1-5. IEEE, (2019)