Author of the publication

Software-defined networks: A walkthrough guide from occurrence To data plane fault tolerance.

, , , and . PeerJ PrePrints, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A watermarking scheme for DIBR images., and . IC3D, page 1-6. IEEE, (2015)Crypto-based algorithms for secured medical image transmission., , and . IET Inf. Secur., 9 (6): 365-373 (2015)Reversible data hiding in adjacent zeros., and . Multim. Syst., 27 (2): 229-245 (2021)Hybrid DWT-SVD audio watermarking., , and . ICDIM, page 525-529. IEEE, (2010)A dual transform audio watermarking algorithm.. Multimedia Tools Appl., 73 (3): 1897-1912 (2014)Software-defined networks: A walkthrough guide from occurrence To data plane fault tolerance., , , and . PeerJ PrePrints, (2019)Reversible data hiding using bit flipping and histogram shifting., and . Multim. Tools Appl., 81 (9): 12441-12458 (2022)DWT-based audio watermarking., , and . Int. Arab J. Inf. Technol., 8 (3): 326-333 (2011)Copyright Protection of Relational Database Systems., , and . NDT (1), volume 87 of Communications in Computer and Information Science, page 143-150. Springer, (2010)Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security., and . NetSys, page 1-6. IEEE, (2019)