Author of the publication

Subscriber data and semantic web for provisioning novel end-user services in telecommunication networks.

, , , and . IEEE Communications Magazine, 50 (3): 42-50 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unsupervised GAN-Based Intrusion Detection System Using Temporal Convolutional Networks and Self-Attention., , , , and . IEEE Trans. Netw. Serv. Manag., 20 (4): 4951-4963 (December 2023)An IMS Based Inter-working Solution for Multimedia Service in a Converged Network.. MUE, page 19-24. IEEE Computer Society, (2008)EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum., , and . ACM Trans. Internet Techn., 24 (1): 2:1-2:30 (February 2024)A Novel Lookup Service Enabler for Presence-Based Applications and Its Architecture in the 3GPP IP Multimedia Subsystem., , , and . NTMS, page 1-6. IEEE, (2009)Network Intrusion Detection via Flow-to-Image Conversion and Vision Transformer Classification., , , and . IEEE Access, (2022)Method of Inter-Working between IMS and Non-IMS (Google Talk) Networks for Multimedia Services., and . SIGMAP, page 251-256. INSTICC Press, (2008)A group common community conversation - C3 service across different social networks., , and . PIMRC, page 2577-2582. IEEE, (2012)Multi-Objective GAN-Based Adversarial Attack Technique for Modulation Classifiers., , , , and . IEEE Commun. Lett., 26 (7): 1583-1587 (2022)Subscriber data and semantic web for provisioning novel end-user services in telecommunication networks., , , and . IEEE Communications Magazine, 50 (3): 42-50 (2012)A Study on the Use of Runtime Files in Handling Crash Reports in a Large Telecom Company., , , , , , and . FNWF, page 98-103. IEEE, (2022)