Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Service overlays for Ethernet LAN over SONET/SDH., , , , , and . Opt. Switch. Netw., 7 (2): 54-65 (2010)High rate fibonacci polynomial codes., , and . ISIT, page 1921-1924. IEEE, (2011)A Secure Code Based Cryptosystem via Random Insertions, Deletions, and Errors., and . IEEE Communications Letters, 20 (5): 870-873 (2016)Maximum-Girth Cylinder-Type Block-Circulant LDPC Codes., and . IEEE Trans. Commun., 60 (4): 952-962 (2012)Enterprise Social Networking Platform and Employees' Job Mobility., and . ICIS, Association for Information Systems, (2022)Code-based security with random interleaving., and . IET Commun., 11 (8): 1195-1198 (2017)Supporting security against SYN flooding attacks in distributed denial-of-service via measuring internet protocol flow information export-based traffic., , and . Int. J. Electron. Secur. Digit. Forensics, 2 (1): 49-57 (2009)Advanced crankback provisioning for multi-domain networks., , , and . HPSR, page 209-214. IEEE, (2010)Intrusion Detection via Fuzzy-Genetic Algorithm Combination with Evolutionary Algorithms., , , and . ACIS-ICIS, page 587-591. IEEE Computer Society, (2007)The Modeling of Pulsatile Blood Flow as Cross-Williamson and Carreau Fluids in an Artery with a Partial Occlusion., , and . EMS, page 191-196. IEEE Computer Society, (2008)