Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence., , and . Serv. Oriented Comput. Appl., 14 (3): 175-187 (2020)DDoS Attack Detection and Mitigation in Software-Defined Networking-Based 5G Mobile Networks with Multiple Controllers., , and . FiCloud, page 32-39. IEEE, (2022)Analysis of Discrete Time Queueing Networks under Buffer Threshold Scheme., , and . ICCCN, page 1273-1278. IEEE, (2007)A Formal Approach to Investigate the Performance of Modern E-commerce Services., , , and . ASMTA, volume 6148 of Lecture Notes in Computer Science, page 233-246. Springer, (2010)Modeling and Performance Analysis of Scalable Web Servers Deployed on the Cloud., , and . BWCCA, page 238-242. IEEE, (2013)Fast Handoff Scheme Using Location Information., , and . UKSim, page 428-433. IEEE Computer Society, (2008)Special issue on "Modeling and simulation techniques for future generation communication networks"., , and . Simul. Model. Pract. Theory, 18 (4): 405-406 (2010)Evaluation of AV systems against modern malware., , , and . ICITST, page 269-273. IEEE, (2017)Enhanced Mobile IP handoff using link layer information., , and . iiWAS, page 344-349. ACM, (2009)Performance Analysis of Angle Routing in MANETs., , , and . NBiS, volume 5186 of Lecture Notes in Computer Science, page 21-29. Springer, (2008)