Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Network Infrastructure Security using Geospatial Technology., , , , , and . CCECE, page 1601-1604. IEEE, (2006)Instant Messaging Application Encrypted Traffic Generation System., , , , , and . NOMS, page 1-3. IEEE, (2023)Analyzing Traffic Characteristics of Instant Messaging Applications on Android Smartphones., , , , , and . NOMS, page 1-5. IEEE, (2023)An Empirical Study of Today's Internet Traffic for Differentiated Services IP QoS., , , and . ISCC, page 207-213. IEEE Computer Society, (2000)Classifying P2P activity in Netflow records: A case study on BitTorrent., , , and . ICC, page 3018-3023. IEEE, (2013)Using TCP models to understand bandwidth assurance in a Differentiated Services network., , , , and . GLOBECOM, page 1800-1805. IEEE, (2001)Classification of applications in HTTP tunnels., , , and . CloudNet, page 67-74. IEEE, (2013)A Connectionless Approach to Providing QoS in IP Networks., , , and . HPN, volume 134 of IFIP Conference Proceedings, page 363-379. Kluwer, (1998)Combining SPF and source routing for an efficient probing solution in IPv6 topology discovery., , , , and . GIIS, page 1-6. IEEE, (2014)Depicting Instant Messaging Encrypted Traffic Characteristics through an Empirical Study., , , , , and . ICCCN, page 1-10. IEEE, (2023)