Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolution and Evaluation of Internet Content Delivery., , and . International Conference on Internet Computing, page 502-505. CSREA Press, (2003)On-the-Fly Capture and Replay Mechanisms for Multi-Port Network Devices in Operational Networks., , , and . IEEE Trans. Network and Service Management, 11 (2): 158-171 (2014)Hardware-Software Codesign for High-Speed Signature-based Virus Scanning., , , and . IEEE Micro, 29 (5): 56-65 (2009)An event-based SDN architecture for network security analysis., , and . ICCST, page 159-164. IEEE, (2015)Differential Age Trajectories of White Matter Changes Between Sexes Correlate with Cognitive Performances., , , , , , and . Brain Connect., 11 (9): 759-771 (2021)Controllable Path Planning and Traffic Scheduling for Emergency Services in the Internet of Vehicles., , and . IEEE Trans. Intell. Transp. Syst., 23 (8): 12399-12413 (2022)Deep Learning-Based Localization and Outlier Removal Integration Model for Indoor Surveillance., , , and . ICC, page 4879-4884. IEEE, (2023)StateFit: A Security Framework for SDN Programmable Data Plane Model., , and . I-SPAN, page 168-173. IEEE, (2018)Domain-Specific Anomaly Detection for In-Vehicle Networks., , and . ICS, volume 1723 of Communications in Computer and Information Science, page 637-648. Springer, (2022)Does Playing Online Mobile Games Overcharge You for the Fun?, , and . MobiGames@MobiSys, page 13-18. ACM, (2015)