Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network., , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 96-107. Springer, (2005)Intrusion detection for link state routing protocol through integrated network management., , , and . ICCCN, page 634-639. IEEE, (1999)A property oriented fault detection approach for link state routing protocol., , and . ICCCN, page 114-119. IEEE, (2000)iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks., , , and . INFOCOM, page 968-976. IEEE, (2008)Measuring Message Propagation and Social Influence on Twitter.com., and . SocInfo, volume 6430 of Lecture Notes in Computer Science, page 216-231. Springer, (2010)Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups., , , , , , and . CoRR, (2018)More or Less? Predict the Social Influence of Malicious URLs on Social Media., , , , , , , and . CoRR, (2018)On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies., , and . NOMS (1), page 277-290. IEEE, (2004)The implementation of data storage and analytics platform for big data lake of electricity usage with spark., , , and . J. Supercomput., 77 (6): 5934-5959 (2021)On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits., , , and . CCS, page 235-248. ACM, (2005)