Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient MD Coding Core Selection to Reduce the Bandwidth Consumption., , and . LCN, page 231-233. IEEE Computer Society, (2007)Traffic storing and related information generation system for cyber attack analysis., , , , and . ICTC, page 1052-1057. IEEE, (2016)Malware detection using malware image and deep learning., , , and . ICTC, page 1193-1195. IEEE, (2017)Secure mutual proximity zone enclosure evaluation., , and . SIGSPATIAL/GIS, page 133-142. ACM, (2014)Authenticated Top-K Aggregation in Distributed and Outsourced Databases., , and . SocialCom/PASSAT, page 779-788. IEEE Computer Society, (2012)Performance Comparison of Relational Databases and Columnar Databases Using Bitmap Index for Fast Search of 10Gbps Network Flows., , , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 171-175. Springer, (2015)Similarity Hash Index., , and . ICTC, page 1298-1300. IEEE, (2018)Energy efficient Network Mobility under Scatternet/WLAN coexistence., , , and . PIMRC, page 742-746. IEEE, (2009)Secure and resilient proximity-based access control., , , , and . DARE@CIKM, page 15-20. ACM, (2013)Transmitted file extraction and reconstruction from network packets., , , , and . WorldCIS, page 164-165. IEEE, (2015)