Author of the publication

Software defined networking for security enhancement in wireless mobile networks.

, , , and . Comput. Networks, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wireless Epidemic Spread in Dynamic Human Networks Bio-Inspired Computing and Communication, , , , , and . Bio-Inspired Computing and Communication, volume 5151 of Lecture Notes in Computer Science, chapter 11, Springer Berlin / Heidelberg, Berlin, Heidelberg, (2008)Probabilistic event resolution with the pairwise random protocol., and . NOSSDAV, page 67-72. ACM, (2009)Personal data: thinking inside the box., , , , , , and . Aarhus Conference on Critical Alternatives, page 29-32. Aarhus University Press / ACM, (2015)The near-term feasibility of P2P MMOG's., and . NETGAMES, page 1-6. IEEE, (2010)General Internet Signaling Transport (GIST) over Stream Control Transmission Protocol (SCTP) and Datagram Transport Layer Security (DTLS)., , and . RFC, (January 2011)LiteLab: Efficient large-scale network experiments., , , and . CCNC, page 60-66. IEEE, (2016)Delivery Properties of Human Social Networks., , and . INFOCOM, page 2586-2590. IEEE, (2009)Cutting the energy cost of TV content distribution by 5, by understanding the popularity of the top ten programs.. e-Energy, page 1. ACM, (2012)Vigilante: end-to-end containment of internet worms., , , , , , and . SOSP, page 133-147. ACM, (2005)Network coding with traffic engineering., , , , and . CoNEXT, page 40. ACM, (2006)