Author of the publication

Scalable proxy mobile IPv6 for heterogeneous wireless networks.

, and . Mobility Conference, page 64. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection., , , , and . CoRR, (2023)An Intelligent Tunneling Framework for Always Best Connected Support in Network Mobility (NEMO)., and . WCNC, page 3021-3026. IEEE, (2008)A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks., , , , , and . IEEE Access, (2023)Assessing the Threats Targeting Low Latency Traffic: the Case of L4S., , , , , and . CNSM, page 544-550. IEEE, (2021)Scalable proxy mobile IPv6 for heterogeneous wireless networks., and . Mobility Conference, page 64. ACM, (2008)Enhancements for Simultaneous Access in Network-based Localized Mobility Management., and . PIMRC, page 1-5. IEEE, (2007)Formal Verification of Coordination Systems' Requirements - A Case Study on the European Train Control System., and . SEKE, page 393-396. Knowledge Systems Institute Graduate School, (2014)HTTP/2 Attacks Generation using 5Greplay., , , , and . ARES, page 138:1-138:7. ACM, (2023)Passive conformance testing of service choreographies., , and . SAC, page 1528-1535. ACM, (2012)Online Verification of Value-Passing Choreographies through Property-Oriented Passive Testing., , and . HASE, page 106-113. IEEE Computer Society, (2012)