Author of the publication

An efficient packet loss recovery methodology for video-over-IP.

, , , and . SIP, page 270-275. IASTED/ACTA Press, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Derivation and Visualization of the Binomial Theorem., and . Int. J. Comput. Math. Learn., 5 (1): 3-24 (2000)Laboratory projects for embedded and control systems security., and . InfoSecCD, page 13:1. ACM, (2014)An efficient packet loss recovery methodology for video-over-IP., , , and . SIP, page 270-275. IASTED/ACTA Press, (2007)Assessing Competencies Using Scenario-Based Learning in Cybersecurity., and . J. Cybersecur. Priv., 1 (4): 539-552 (September 2021)An Intelligent RFID Based Wireless Tools and Asset Tracking System.. International Conference on Wireless Networks, page 651-657. CSREA Press, (2004)Critical infrastructure security curriculum modules.. InfoSecCD, page 54-58. ACM, (2011)Steganography obliterator: an attack on the least significant bits., and . InfoSecCD, page 85-91. ACM, (2006)An Empirical Study on the Performance of Java/.Net Cryptographic APIs., and . Information Systems Security, 16 (6): 344-354 (2007)A Consensus of Thought in Applying Change Management to Information System Environments., , and . Int. J. Inf. Syst. Model. Des., 6 (4): 24-41 (2015)Computer Forensic Tools and Techniques., and . Security and Management, page 248-252. CSREA Press, (2005)