Author of the publication

A study of femtocell architectures for long term evolution (LTE)-advanced network.

, , and . CCECE, page 817-821. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Local IP Access (LIPA) enabled 3G and 4G femtocell architectures., , and . CCECE, page 1049-1053. IEEE, (2011)A study of femtocell architectures for long term evolution (LTE)-advanced network., , and . CCECE, page 817-821. IEEE, (2011)Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches., , and . CoRR, (2020)On the detection of privacy and security anomalies.. University College Cork, Republic of Ireland, (2020)base-search.net (ftunivcollcork:oai:cora.ucc.ie:10468/10521).Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches., , and . EISA, volume 1403 of Communications in Computer and Information Science, page 178-197. Springer, (2021)Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access., , and . IEEE BigData, page 3094-3099. IEEE, (2018)On Perceptual Encryption: Variants of DCT Block Scrambling Scheme for JPEG Compressed Images., , and . FGIT-SIP/MulGraB, volume 123 of Communications in Computer and Information Science, page 212-223. Springer, (2010)Privacy Interpretation of Behavioural-based Anomaly Detection Approaches., , and . CoRR, (2020)Quantitatively Measuring Privacy in Interactive Query Settings Within RDBMS Framework., , and . Frontiers Big Data, (2020)Towards Privacy-anomaly Detection: Discovering Correlation between Privacy and Security-anomalies., , and . FNC/MobiSPC, volume 175 of Procedia Computer Science, page 331-339. Elsevier, (2020)