Author of the publication

Feasibility of Societal Model for Securing Internet of Things.

, , , and . KSII Trans. Internet Inf. Syst., 12 (8): 3567-3588 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting IP/LEO satellite networks by handover-independent IP mobility management., , , and . IEEE J. Sel. Areas Commun., 22 (2): 300-307 (2004)Detecting DRDoS attacks by a simple response packet confirmation mechanism., , , , , and . Comput. Commun., 31 (14): 3299-3306 (2008)Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition., , , , and . ICC, page 1670-1674. IEEE, (2008)Security by simple network traffic monitoring., and . SIN, page 201-204. ACM, (2012)BGP/MPLS Layer 3 VPN Multicast Management Information Base.. RFC, (December 2018)A Reliable Network Identification Method Based on Transition Pattern of Payload Length., , , and . GLOBECOM, page 1915-1919. IEEE, (2008)Wireless telemedicine services over integrated IEEE 802.11/WLAN and IEEE 802.16/WiMAX networks., , and . IEEE Wirel. Commun., 17 (1): 30-36 (2010)Network Application Identification Using Transition Pattern of Payload Length., , , , , and . WCNC, page 2633-2638. IEEE, (2008)Security and Privacy Awareness: for Software Creators and Users., and . iCAST, page 1-4. IEEE, (2019)Network Controlled Handover for Improving TCP Performance in LEO Satellite Networks., , , , and . GLOBECOM, IEEE, (2006)