Author of the publication

Security Threats and Countermeasure Frame Using a Session Control Mechanism on VoLTE.

, , , and . BWCCA, page 532-537. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dual Unbiased Recommender Learning for Implicit Feedback., , and . SIGIR, page 1647-1651. ACM, (2021)Non-Essential Is NEcessary: Order-agnostic Multi-hop Question Generation., , , and . LREC/COLING, page 12300-12306. ELRA and ICCL, (2024)RT-VQ2A2: Real Time Vector Quantized Question Answering with ASR., , and . LREC/COLING, page 14204-14214. ELRA and ICCL, (2024)Unsupervised Dialogue Topic Segmentation in Hyperdimensional Space., , and . INTERSPEECH, page 730-734. ISCA, (2023)Teacher Intervention: Improving Convergence of Quantization Aware Training for Ultra-Low Precision Transformers., , , , and . EACL, page 916-929. Association for Computational Linguistics, (2023)A Wearable System for Heart Rate Recovery Evaluation with Real-Time Classification on Exercise Condition., , , , , , , and . EMBC, page 7609-7612. IEEE, (2021)Threats and Countermeasures on a 4G Mobile Network., , , , and . IMIS, page 538-541. IEEE Computer Society, (2014)SIP amplification attack analysis and detection in VoLTE service network., , , , and . ICOIN, page 334-336. IEEE Computer Society, (2016)Vestiges of Past Generation: Threats to 5G Core Network., , , , , and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 468-480. Springer, (2020)Application of X-Ray Imaging and Convolutional Neural Networks in the Prediction of Tomato Seed Viability., , , , , , and . IEEE Access, (2023)