Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Correlation Between Flow Data and AS Paths in BGP Routing., , , and . ISPA Workshops, volume 4331 of Lecture Notes in Computer Science, page 1126-1135. Springer, (2006)A Proposal to Enhance and Control Continuous Communications in Proxy Mobile IPv6., , and . AINA, page 456-462. IEEE Computer Society, (2009)Penetration Testing Framework for IoT., , , , and . IIAI-AAI, page 477-482. IEEE, (2019)A Hybrid Storage System Composed of On-the-Fly Automated Storage Tiering (OTF-AST) and Caching., and . CANDAR, page 406-411. IEEE Computer Society, (2014)Collaborative Spoofing Detection and Mitigation - SDN Based Looping Authentication for DNS Services., and . COMPSAC Workshops, page 565-570. IEEE Computer Society, (2016)978-1-4673-8845-0.Social-oriented adaptive transmission in wireless ad hoc networks., , , and . ICC, page 490-495. IEEE, (2014)The Bandwidth Feasibility Test Method for Ubiquitous Teleconference on Future Internet., , and . ISPA, page 790-794. IEEE Computer Society, (2008)Design and Evaluation of Dynamic Protocol Selection Architecture for Reliable Multicast., , and . SAINT, page 262-269. IEEE Computer Society, (2002)Networked Augmented Spatial Hypermedia System on Internet., , and . VDB, volume 168 of IFIP Conference Proceedings, page 239-. Kluwer, (2000)Fast failover mechanism for software defined networking: OpenFlow based., and . CFI, page 16:1-16:2. ACM, (2014)