Author of the publication

TCP/IP Attacks, Defenses and Security Tools

, and . International Journal of Innovative Science and Modern Engineering (IJISME), 1 (10): 42-47 (September 2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed and Elastic Application Processing Model for Mobile Cloud Computing., , , , , and . Wirel. Pers. Commun., 95 (4): 4403-4423 (2017)Mobile Data Transfer Scheduling with Uncertainty., , , and . ICC, page 1-6. IEEE, (2010)Traffic engineering and QoS control between wireless diffserv domains using PQ and LLQ., , and . MOBIWAC, page 120-129. ACM, (2007)Towards the formation of comprehensive SLAs between heterogeneous wireless DiffServ domains., , and . Telecommun. Syst., 42 (3-4): 179-199 (2009)Performance Analysis of Priority Queuing Model for Low Power Wireless Body Area Networks (WBANs)., , and . FNC/MobiSPC, volume 34 of Procedia Computer Science, page 518-525. Elsevier, (2014)The Exact Analysis of Limited Service Polling Systems Combined with Non-preemptive Priority Scheduling under Self-similar Traffic Input., , , and . ANT/SEIT, volume 19 of Procedia Computer Science, page 214-223. Elsevier, (2013)Optimal PPDU Duration Algorithm for VHT MU-MIMO Systems., , and . ICCCN, page 1-2. IEEE, (2017)A novel framework for G/M/1 queuing system based on scheduling-cum-polling mechanism to analyze multiple classes of self-similar and LRD traffic., , , , and . Wirel. Networks, 22 (4): 1269-1284 (2016)Realistic data transfer scheduling with uncertainty., , , and . Comput. Commun., 34 (9): 1055-1065 (2011)Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks., , , and . ADHOC-NOW Workshops, volume 8629 of Lecture Notes in Computer Science, page 111-122. Springer, (2014)