Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

White list-based ransomware real-time detection and prevention for user device protection., , and . ICCE, page 1-5. IEEE, (2018)Preallocated Duplicate Name Prefix Detection Mechanism Using Naming Pool in CCN Based Mobile IoT Networks., and . Mob. Inf. Syst., (2016)A network selection scheme for multicast applications in wireless network convergence., , , , and . Wirel. Commun. Mob. Comput., 12 (11): 999-1012 (2012)Pre-allocated duplicate name prefix detection mechanism using naming-pool in mobile content-centric network., and . ICUFN, page 115-117. IEEE, (2015)QoS support in mobile/wireless IP networks using differentiated services and fast handoff method., , , and . WCNC, page 266-270. IEEE, (2000)A DNA assembly model of sentence generation., , , , , , and . Biosyst., 106 (1): 51-56 (2011)Location management area (LMA)-based MBS handover in mobile WiMAX systems., , , and . COMSWARE, page 341-348. IEEE, (2008)This is Your President Speaking: Spoofing Alerts in 4G LTE Networks., , , , , , , and . MobiSys, page 404-416. ACM, (2019)An FFE Transmitter Which Automatically and Adaptively Relaxes Impedance Matching., , , , , , and . IEEE J. Solid State Circuits, 53 (6): 1780-1792 (2018)FLARE: Coordinated Rate Adaptation for HTTP Adaptive Streaming in Cellular Networks., , , , , , and . ICDCS, page 298-307. IEEE Computer Society, (2017)