Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced Mobile IP handoff using link layer information., , and . iiWAS, page 344-349. ACM, (2009)Performance Analysis of Angle Routing in MANETs., , , and . NBiS, volume 5186 of Lecture Notes in Computer Science, page 21-29. Springer, (2008)Performance Evaluation of Weighted Fair Queuing System Using Matrix Geometric Method., , and . Networking, volume 5550 of Lecture Notes in Computer Science, page 66-78. Springer, (2009)Evaluation of AV systems against modern malware., , , and . ICITST, page 269-273. IEEE, (2017)Special issue on "Modeling and simulation techniques for future generation communication networks"., , and . Simul. Model. Pract. Theory, 18 (4): 405-406 (2010)Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence., , and . Serv. Oriented Comput. Appl., 14 (3): 175-187 (2020)Analysis of Discrete Time Queueing Networks under Buffer Threshold Scheme., , and . ICCCN, page 1273-1278. IEEE, (2007)A Formal Approach to Investigate the Performance of Modern E-commerce Services., , , and . ASMTA, volume 6148 of Lecture Notes in Computer Science, page 233-246. Springer, (2010)DDoS Attack Detection and Mitigation in Software-Defined Networking-Based 5G Mobile Networks with Multiple Controllers., , and . FiCloud, page 32-39. IEEE, (2022)Modeling and Performance Analysis of Scalable Web Servers Deployed on the Cloud., , and . BWCCA, page 238-242. IEEE, (2013)