Author of the publication

Modeling QoS Parameters of VoIP Traffic with Multifractal and Markov Models.

, , and . ICA3PP (2), volume 7017 of Lecture Notes in Computer Science, page 255-265. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber Security Concerns in Social Networking Service., , , and . Int. J. Commun. Networks Inf. Secur., (2020)Smartening the Environment using Wireless Sensor Networks in a Developing Country, , and . CoRR, (2007)Security Management in Wireless Sensor Networks with a Public Key Based Scheme., , , and . APNOMS, volume 4773 of Lecture Notes in Computer Science, page 503-506. Springer, (2007)On the Key Revocation Schemes in Wireless Sensor Networks., , and . GreenCom/iThings/CPScom, page 290-297. IEEE, (2013)PeerMate: A malicious peer detection algorithm for P2P systems based on MSPCA., , , and . ICNC, page 815-819. IEEE Computer Society, (2012)Protection of Integrity and Ownership of PDF Documents Using Invisible Signature., , , and . UKSim, page 533-537. IEEE Computer Society, (2012)NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks., , , , and . Int. Arab J. Inf. Technol., 5 (1): 102-107 (2008)Information integrity in smart grid systems., , , , and . Inf. Syst., (2015)Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification., and . Complex Adapt. Syst. Model., (2019)Secure Clustering in DSN with Key Predistribution and WCDS, and . CoRR, (2007)