Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XDC Network Assessment: Decentralization, Scalability and Security., and . CoRR, (2024)QoS Support in TLMM: Three Level Mobility Model for IP-Based Networks., , , and . IWDC, volume 3326 of Lecture Notes in Computer Science, page 192-197. Springer, (2004)Study of snort-based IDS., , and . ICWET, page 43-47. ACM, (2010)An Approach for Optimal Hierarchical Mobility, Management Network Architecture., , , and . VTC Spring, page 481-485. IEEE, (2006)FPGA Implementation of Pipelined Blowfish Algorithm., , , and . ISED, page 208-209. IEEE Computer Society, (2014)HawkEye solutions: a network intrusion detection system., , and . ICWET, page 252-257. ACM, (2011)TLMM: MIP-based Three Level Mobility Model., , , and . Comput. Commun., 30 (6): 1244-1257 (2007)Mobility support in IP: a survey of related protocols., , , and . IEEE Netw., 18 (6): 34-40 (2004)Back propagation neural network approach to Intrusion Detection System., , , and . ReTIS, page 303-308. IEEE, (2011)Global Mobility Management: A Three Level Architecture for Next Generation Wireless Networks., , , , , and . IWDC, volume 2918 of Lecture Notes in Computer Science, page 184-193. Springer, (2003)