Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mechanisms for Inter-domain QoS Routing in Differentiated Service Networks., and . QofIS, volume 1922 of Lecture Notes in Computer Science, page 153-166. Springer, (2000)An Intelligent Defense and Filtration Platform for Network Traffic., , , and . WWIC, volume 10866 of Lecture Notes in Computer Science, page 107-118. Springer, (2018)A Lightweight Clustering Algorithm Utilizing Capacity Heterogeneity., , and . Med-Hoc-Net, volume 197 of IFIP, page 255-264. Springer, (2005)Performance Evaluation of a Combined Anomaly Detection Platform., , , , and . IEEE Access, (2019)Controlling Cloud Data Access Based on Reputation., , and . Mob. Networks Appl., 20 (6): 828-839 (2015)TruSMS: A trustworthy SMS spam control system based on trust management., , , and . Future Gener. Comput. Syst., (2015)A Novel Multi-path Routing Protocol., , , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 732-741. Springer, (2005)Software Defined 5G Mobile Backhaul., , , , , and . 5GU, page 258-263. ICST, (2014)Implementing Trust-to-Trust with Customer Edge Switching.. AINA Workshops, page 1092-1099. IEEE Computer Society, (2010)Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks., , and . ICCCN, page 1-11. IEEE, (2020)