Author of the publication

Enhancing security in mobile data networks through end user and core network cooperation.

, and . MoMM, page 253. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing OpenFlow, SDN and NFV in GPRS Core Network., and . TRIDENTCOM, volume 137 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 184-193. Springer, (2014)Reducing Keepalive Traffic in Software-Defined Mobile Networks with Port Control Protocol., , and . ICT-EurAsia/CONFENIS, volume 9357 of Lecture Notes in Computer Science, page 3-12. Springer, (2015)Enhancing security in mobile data networks through end user and core network cooperation., and . MoMM, page 253. ACM, (2013)An IP based security threat in mobile networks., and . MIPRO, page 667-670. IEEE, (2012)Integrating Mobile OpenFlow Based Network Architecture with Legacy Infrastructure., , , , and . ICT-EurAsia/CONFENIS, volume 9357 of Lecture Notes in Computer Science, page 40-49. Springer, (2015)Audio compression using sinusoidal modeling with 1D and 2D wavelet residuum coding., and . WMNC, page 44-47. IEEE, (2012)Sinusoidal Parametrization for Speech Synthesis in Mobile Phones., , and . CGVR, page 54-58. CSREA Press, (2009)