Author of the publication

Provisioning Fog Services to 3GPP Subscribers: Authentication and Application Mobility.

, , , , and . ICC, page 4926-4931. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation of multihomed NEMO., , and . ICC, page 5429-5433. IEEE, (2012)A novel scheduling and queue management scheme for multi-band mobile routers., , and . ICC, page 3787-3791. IEEE, (2013)Signaling Cost Analysis of Mobility Protocols Using City Section Mobility Model., and . CSA, page 1-6. IEEE, (2009)An Integrated Inspection and Visualization Tool for Accurate Android Collusive Malware Detection., , and . NSysS, page 107-114. ACM, (2020)Towards an Attention-Based Accurate Intrusion Detection Approach., , , and . QSHINE, volume 402 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 261-279. Springer, (2021)Comparison of NEMO Schemes in Proxy Mobile IPv6 Domain., , , and . GLOBECOM, page 1-6. IEEE, (2016)Sequencing System Calls for Effective Malware Detection in Android., , and . GLOBECOM, page 1-7. IEEE, (2018)Detecting Network Intrusion through Anomalous Packet Identification., , and . ITNAC, page 1-6. IEEE, (2020)Communication and Computation Offloading for 5G V2X: Modeling and Optimization., , , , and . GLOBECOM, page 1-6. IEEE, (2020)Privacy Breach in Android Smartphone Through Inaudible Sound., and . WCNC, page 2441-2446. IEEE, (2022)