Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced Mobile IP handoff using link layer information., , and . iiWAS, page 344-349. ACM, (2009)Performance Evaluation of Weighted Fair Queuing System Using Matrix Geometric Method., , and . Networking, volume 5550 of Lecture Notes in Computer Science, page 66-78. Springer, (2009)Performance Analysis of Angle Routing in MANETs., , , and . NBiS, volume 5186 of Lecture Notes in Computer Science, page 21-29. Springer, (2008)Evaluation of AV systems against modern malware., , , and . ICITST, page 269-273. IEEE, (2017)Special issue on "Modeling and simulation techniques for future generation communication networks"., , and . Simul. Model. Pract. Theory, 18 (4): 405-406 (2010)Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence., , and . Serv. Oriented Comput. Appl., 14 (3): 175-187 (2020)Towards QoS in Internet of Things for Delay Sensitive Information., and . MobiWIS (Workshops), volume 183 of Communications in Computer and Information Science, page 86-94. Springer, (2013)DDoS Attack Detection and Mitigation in Software-Defined Networking-Based 5G Mobile Networks with Multiple Controllers., , and . FiCloud, page 32-39. IEEE, (2022)Analysis of Discrete Time Queueing Networks under Buffer Threshold Scheme., , and . ICCCN, page 1273-1278. IEEE, (2007)Performance Analysis of DSR & Extended DSR Protocols., , , and . Asia International Conference on Modelling and Simulation, page 191-196. IEEE Computer Society, (2008)