Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of CPU-bound Processes on IP Forwarding of Linux and Windows XP., and . J. Univers. Comput. Sci., 16 (21): 3299-3313 (2010)Teaching Cybersecurity Using the Cloud., , and . IEEE Trans. Learn. Technol., 8 (4): 383-392 (2015)ASIC Implementation of Energy-Optimized Successive Cancellation Polar Decoders for Internet of Things., , , , , and . ICM, page 260-263. IEEE, (2018)A Novel TSV-Based power harvesting system for low-power applications.. ICM, page 178-181. IEEE, (2015)An analytical simulator for deploying IP telephony., , , and . Int. J. Netw. Manag., 19 (1): 25-37 (2009)Supply Chain Inventory Sharing Using Ethereum Blockchain and Smart Contracts., , , , , and . IEEE Access, (2022)An Efficient Hardware Accelerator For Lossless Data Compression., , , , , , and . ICCSPA, page 1-4. IEEE, (2022)Blockchain-Based Solution for Multiple Operator Spectrum Sharing (MOSS) in 5G Networks., , , , and . GLOBECOM (Workshops), page 1-6. IEEE, (2020)A Design of An Autoencoder-Based Audio Compression and Decompression System., , , , , , , and . ICECS, page 1-6. IEEE, (2023)Harnessing the cloud for teaching cybersecurity.. SIGCSE, page 529-534. ACM, (2014)