The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Muhammad Sher: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Muhammad Sher, Thomas Magedanz, Walter T. Penzhorn
    Inter-Domains Security Management (IDSM) Model for IP Multimedia Subsystem (IMS). [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:502-509 [Conf]
  2. Muhammad Sher, Thomas Magedanz
    Network Access Security Management (NASM) Model for Next Generation Mobile Telecommunication Networks. [Citation Graph (0, 0)][DBLP]
    MATA, 2005, pp:263-272 [Conf]
  3. Raheel Siddiqui, Muhammad Sher, Khalid Rashid
    Face Identification based on Biological Trait using Infrared Images after Cold Effect Enhancement and Sunglasses Filtering. [Citation Graph (0, 0)][DBLP]
    WSCG (Posters), 2004, pp:161-164 [Conf]
  4. Muhammad Sher, Thomas Magedanz
    Security Associations Management (SAM) Model for IP Multimedia System (IMS). [Citation Graph (0, 0)][DBLP]
    Net-Con, 2005, pp:311-325 [Conf]

  5. 3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model. [Citation Graph (, )][DBLP]


  6. Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks. [Citation Graph (, )][DBLP]


  7. Secure access to IP multimedia services using generic bootstrapping architecture (GBA) for 3G & beyond mobile networks. [Citation Graph (, )][DBLP]


  8. Autonomic View of Query Optimizers in Database Management Systems. [Citation Graph (, )][DBLP]


  9. Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks. [Citation Graph (, )][DBLP]


  10. Provisioning IMS-based seamless triple play services over different access networks. [Citation Graph (, )][DBLP]


  11. Performance analysis of TCP in VANETs by using 802.11e. [Citation Graph (, )][DBLP]


  12. Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture. [Citation Graph (, )][DBLP]


  13. A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications. [Citation Graph (, )][DBLP]


  14. State Of The Art In Digital Steganography Focusing ASCII Text Documents [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002