Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDoS Detection Algorithm Using the Bidirectional Session., , , and . CN, volume 160 of Communications in Computer and Information Science, page 191-203. Springer, (2011)QoS support for advanced multimedia systems., , , and . ICOIN, page 453-456. IEEE Computer Society, (2012)Viewpoint Networking for Trusted Reality., , , , , and . ICUFN, page 538-540. IEEE, (2019)Dynamic Load Balancing Mechanism in Mobile Gateway with Heterogeneous Network., , , , , and . ICTC, page 1549-1554. IEEE, (2018)Device Independent YANG Auto-generation Mechanism., , and . ICTC, page 1300-1305. IEEE, (2021)User-Centric Key Management Scheme for Personal Cloud Storage., , , , , and . ICISA, page 1-4. IEEE, (2013)A Residual Power Balancing Routing by Traffic-Splitting Transmission in Mobile Ad-Hoc Networks., , , , , , and . ICISA, page 1-4. IEEE, (2013)User-Centric Security Service Model for Cloud Storage., , , , and . FCC, volume 301 of Lecture Notes in Electrical Engineering, page 373-382. Springer, (2014)Survivable virtual topology design in IP over WDM multi-domain networks., , , , , and . ICC, page 5150-5155. IEEE, (2015)Performance Evaluation of Transport Protocols and Roadmap to a High-Performance Transport Design for Immersive Applications., , , and . ICUFN, page 926-931. IEEE, (2023)