Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sidelobe Exploitation for Beam Discovery in Line of Sight Millimeter Wave Systems., and . IEEE Wirel. Commun. Lett., 7 (2): 234-237 (2018)Flexible advance reservation models for virtual network scheduling., , , , , and . LCN Workshops, page 651-656. IEEE Computer Society, (2015)Progressive recovery for network virtualization after large-scale disasters., , , , , , and . ICNC, page 1-5. IEEE Computer Society, (2016)Integrated traffic grooming in converged data-optical networks., , , and . ISCC, page 294-299. IEEE Computer Society, (2004)Generalized Pattern Search for Beam Discovery in Millimeter Wave Systems., and . VTC Fall, page 1-5. IEEE, (2017)Distributed Grooming in Multi-Domain IP/MPLS-DWDM Networks., , , , , , , , and . GLOBECOM, page 1-6. IEEE, (2009)CAVALIER architecture for metro Data Center Networking., , , and . BROADNETS, page 169-174. IEEE, (2008)A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems., , , , , and . IEEE Access, (2019)IoT Threat Detection Testbed Using Generative Adversarial Networks., , , , , and . CoRR, (2023)SYNGuard: Dynamic threshold-based SYN flood attack detection and mitigation in software-defined networks., , , and . IET Networks, 10 (2): 76-87 (2021)