Author of the publication

A New Method for Creating Efficient Security Policies in Virtual Private Network.

, , , , and . CollaborateCom, volume 10 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 663-678. Springer / ICST, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel model for implicit cooperation between primary users and secondary users in cognitive radio-cooperative communication systems., , and . Int. J. Commun. Syst., (2018)Community-aware single-copy content forwarding in Mobile Social Network., , , and . Wirel. Networks, 24 (7): 2705-2721 (2018)PersianGulf: An Autonomous Combined Traffic Signal Controller and Route Guidance System., , , and . VTC Fall, page 1-6. IEEE, (2011)Localization in Sensor Networks through MALD Algorithm., and . CATA, page 283-288. ISCA, (2007)Efficient Algorithms for Dynamic Detection and Resolution of IPSec/VPN Security Policy Conflicts., and . AINA, page 737-744. IEEE Computer Society, (2010)Middlebox selection optimization via an intelligent framework in software-defined networking., , and . Trans. Emerg. Telecommun. Technol., (2021)Data forwarding scheme to minimize end-to-end delay in Opportunistic Networks., and . IST, page 1-5. IEEE, (2016)A memetic grouping genetic algorithm for cost efficient VM placement in multi-cloud environment., , , and . Clust. Comput., 23 (2): 797-836 (2020)The novel delay-constraint topology control algorithm in WSNs., , and . WOCC, page 111-115. IEEE, (2012)Collision aware topology control algorithm in wireless multihop networks., , and . WOCC, page 186-190. IEEE, (2012)