Author of the publication

A Reactive Traffic Flow Estimation in Software Defined Networks.

, and . ICCCS, page 585-588. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Research of Mosaic Force Elements Orchestration Based on Process Calculus., , , and . ICISS, page 13-22. ACM, (2022)A Survey of Compute First Networking., , , , and . ICCT, page 688-695. IEEE, (2023)Direct Batch Growth Hierarchical Self-Organizing Mapping Based on Statistics for Efficient Network Intrusion Detection., , , , , , , , and . IEEE Access, (2020)A Reactive Traffic Flow Estimation in Software Defined Networks., and . ICCCS, page 585-588. IEEE, (2020)An Improved Wireless Sensor Networks Routing Protocol Based on AODV., , , , , and . CIT, page 742-746. IEEE Computer Society, (2012)A Literature Review of Resiliency Technologies in Military Software Defined Networks., , , , and . DSIT, page 1-7. IEEE, (2022)Interpretation of Learning-Based Automatic Source Code Vulnerability Detection Model Using LIME., , , , , , , , and . KSEM, volume 12817 of Lecture Notes in Computer Science, page 275-286. Springer, (2021)A High Throughput Power-Efficient Optical Memory Subsystem for Kilo-Core Processor., , , , and . NCCET, volume 600 of Communications in Computer and Information Science, page 52-62. Springer, (2017)A Review of Routing Optimization Techniques for Quality of Service Assurance in Software-Defined Networks., , , and . CACML, page 167-174. ACM, (2023)A Comparative Study of Neural Network Techniques for Automatic Software Vulnerability Detection., , , , , , and . TASE, page 1-8. IEEE, (2020)