Author of the publication

A Novel Protocol Design and Collaborative Forensics Mechanism for VoIP Services.

, , , and . J. Commun., 7 (2): 132-142 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Two-Stage Link Scheduling Scheme for Variable-Bit-Rate Traffic Flows in Wireless Mesh Networks., , and . IEEE Trans. Wirel. Commun., 13 (11): 6232-6244 (2014)HiMIP-NEMO: Combining Cross-Layer Network Mobility Management and Resource Allocation for Fast QoS-Handovers., , and . VTC Spring, page 2282-2286. IEEE, (2008)A virtual data queue access scheme for integrated LANs., and . ICCC, page 558-562. International Council for Computer Communication / Elsevier, (1988)Characterizing the Influence of Features on Reading Difficulty Estimation for Non-native Readers., , and . CoRR, (2018)ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps., , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 796-804. Springer, (2018)Behavior profiling for robust anomaly detection., , , and . WCNIS, page 465-471. IEEE, (2010)Distributed Agent-based IP Location System Framework Design., , and . Int. J. Online Biomed. Eng., 9 (S7): 4-11 (2013)Hardware-Assisted MMU Redirection for In-Guest Monitoring and API Profiling., , and . IEEE Trans. Inf. Forensics Secur., (2020)A novel approach to evaluate software vulnerability prioritization., , , and . J. Syst. Softw., 86 (11): 2822-2840 (2013)PVA: A Self-Adaptive Personal View Agent., , and . J. Intell. Inf. Syst., 18 (2-3): 173-194 (2002)