Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An IP based platform for emergency calls and reporting., , , , , , and . IJCIP, 4 (3-4): 137-153 (2011)A DIAMETER based security framework for mobile networks., , and . TEMU, page 7-12. IEEE, (2014)A comprehensive framework for detecting and preventing VoIP fraud and misuse., , , , , and . ICNC, page 807-813. IEEE, (2014)Hard Fusion Based Spectrum Sensing over Mobile Fading Channels in Cognitive Vehicular Networks., , , and . Sensors, 18 (2): 475 (2018)Transmit Power Minimization for Downlink Multi-Cell Multi-Carrier NOMA Networks., , , and . IEEE Communications Letters, 22 (12): 2459-2462 (2018)Access control management and orchestration in NFV environment., , , and . Networking, page 1-2. IEEE Computer Society, (2017)Cloud Enablers For Testing Large-Scale Distributed Applications., , , , , , , , , and . UCC Companion, page 35-42. ACM, (2019)Energy-Spectral Efficiency Tradeoff of Downlink NOMA System with Fairness Consideration., , , and . VTC Spring, page 1-5. IEEE, (2018)VISECO: An Annotated Security Management Framework for 5G., , and . MSPN, volume 11005 of Lecture Notes in Computer Science, page 251-269. Springer, (2018)An Integrated Access Control Service Enabler for Cloud Applications., , , and . FNSS, volume 523 of Communications in Computer and Information Science, page 101-112. Springer, (2015)