default search action
Bogdan Ghita 0003
Person information
- affiliation: University of Plymouth, School of Computing and Mathematics, UK
Other persons with the same name
- Bogdan Ghita 0001 — Centrum Wiskunde & Informatica (CWI), Amsterdam, The Netherlands
- Bogdan Ghita 0002 — University Politehnica of Bucharest, Romania
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Auberlin Paguem Tchinda, Besfort Shala, Armin Lehmann, Bogdan Ghita, David Walker, Ulrich Trick:
Energy-Efficient Placement of Virtual Network Functions in a Wireless Mesh Network. IEEE Access 12: 64807-64822 (2024) - [j25]Taimur Bakhshi, Bogdan Ghita, Ievgeniia Kuzminykh:
A Review of IoT Firmware Vulnerabilities and Auditing Techniques. Sensors 24(2): 708 (2024) - [j24]Nelson L. Santos, Bogdan Ghita, Giovanni Luca Masala:
Medical Systems Data Security and Biometric Authentication in Public Cloud Servers. IEEE Trans. Emerg. Top. Comput. 12(2): 572-582 (2024) - [c78]Abhishek Pratap Singh, Ievgeniia Kuzminykh, Bogdan Ghita:
Industry Perception of Security Challenges with Identity Access Management Solutions. BlackSeaCom 2024: 312-315 - [c77]Bogdan Ghita, Ievgeniia Kuzminykh, Abubakar Usama, Taimur Bakhshi, Jims Marchang:
Deepfake Image Detection Using Vision Transformer Models. BlackSeaCom 2024: 332-335 - [i14]Ali Alshumrani, Nathan L. Clarke, Bogdan V. Ghita:
A Unified Knowledge Graph to Permit Interoperability of Heterogeneous Digital Evidence. CoRR abs/2402.13746 (2024) - [i13]Abhishek Pratap Singh, Ievgeniia Kuzminykh, Bogdan Ghita:
Industry Perception of Security Challenges with Identity Access Management Solutions. CoRR abs/2408.10634 (2024) - 2023
- [j23]Mahyar Taj Dini, Volodymyr Sokolov, Ievgeniia Kuzminykh, Bogdan Ghita:
Brainwave-based authentication using features fusion. Comput. Secur. 129: 103198 (2023) - [c76]Tianqing Xi, Ievgeniia Kuzminykh, Bogdan Ghita, Taimur Bakhshi:
Evaluating Learning Algorithms for Keystroke Based User Authentication. BlackSeaCom 2023: 283-288 - [c75]Boriss Redkins, Ievgeniia Kuzminykh, Bogdan Ghita:
Work-in-Progress: Security of Public-Key Schemes in the Quantum Computing Era - A Literature Review. BlackSeaCom 2023: 414-419 - [c74]Taimur Bakhshi, Bogdan Ghita, Ievgeniia Kuzminykh:
SAFE: a Standardized Automotive Forensic Engine for Law Enforcement Agencies. IIT 2023: 196-201 - [c73]Ali Alshumrani, Nathan L. Clarke, Bogdan Ghita:
A Unified Knowledge Graph to Permit Interoperability of Heterogenous Digital Evidence. UbiSec 2023: 420-435 - [i12]Anita Modi, Ievgeniia Kuzminykh, Bogdan Ghita:
Data Driven Approaches to Cybersecurity Governance for Board Decision-Making - A Systematic Review. CoRR abs/2311.17578 (2023) - 2022
- [j22]Shaykhah S. Aldosari, Bogdan Ghita, Davide Marocco:
A Gesture-Based Educational System that Integrates Simulation and Molecular Visualization to Teach Chemistry. Int. J. Emerg. Technol. Learn. 17(4): 194-211 (2022) - [j21]Damir Dobric, Andreas Pech, Bogdan Ghita, Thomas Wennekers:
On the Importance of the Newborn Stage When Learning Patterns with the Spatial Pooler. SN Comput. Sci. 3(2): 179 (2022) - 2021
- [j20]Taimur Bakhshi, Bogdan Ghita:
Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning. Secur. Commun. Networks 2021: 5363750:1-5363750:16 (2021) - [c72]Ievgeniia Kuzminykh, Bogdan Ghita, Alexandr Silonosov:
On Keystroke Pattern Variability in Virtual Desktop Infrastructure. CMIS 2021: 238-248 - [c71]Nelson L. Santos, Waleed Younis, Bogdan V. Ghita, Giovanni Luca Masala:
Enhancing Medical Data Security on Public Cloud. CSR 2021: 103-108 - [c70]Damir Dobric, Andreas Pech, Bogdan Ghita, Thomas Wennekers:
Improved HTM Spatial Pooler with Homeostatic Plasticity Control. ICPRAM 2021: 98-106 - [c69]Ievgeniia Kuzminykh, Bogdan Ghita, Jose M. Such:
The Challenges with Internet of Things Security for Business. NEW2AN/ruSMART 2021: 46-58 - [c68]Suet Ping Tung, Ka Yan Wong, Ievgeniia Kuzminykh, Taimur Bakhshi, Bogdan Ghita:
Using a Machine Learning Model for Malicious URL Type Detection. NEW2AN/ruSMART 2021: 493-505 - [i11]Vasileios Koutsouvelis, Stavros Shiaeles, Bogdan Ghita, Gueltoum Bendiab:
Detection of Insider Threats using Artificial Intelligence and Visualisation. CoRR abs/2109.02417 (2021) - [i10]Richard Brown, Gueltoum Bendiab, Stavros Shiaeles, Bogdan Ghita:
A Novel Multimodal Biometric Authentication System using Machine Learning and Blockchain. CoRR abs/2109.03014 (2021) - [i9]Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan Ghita, Nicholas Kolokotronis:
Malware Squid: A Novel IoT Malware Traffic Analysis Framework using Convolutional Neural Network and Binary Visualisation. CoRR abs/2109.03375 (2021) - [i8]Christos Constantinides, Stavros Shiaeles, Bogdan V. Ghita, Nicholas Kolokotronis:
A Novel Online Incremental Learning Intrusion Prevention System. CoRR abs/2109.09530 (2021) - [i7]Ievgeniia Kuzminykh, Bogdan Ghita, Stavros Shiaeles:
Comparative Analysis of Cryptographic Key Management Systems. CoRR abs/2109.09905 (2021) - [i6]Ievgeniia Kuzminykh, Dan Shevchuk, Stavros Shiaeles, Bogdan Ghita:
Audio Interval Retrieval using Convolutional Neural Networks. CoRR abs/2109.09906 (2021) - 2020
- [j19]Besfort Shala, Ulrich Trick, Armin Lehmann, Bogdan Ghita, Stavros Shiaeles:
Blockchain and Trust for Secure, End-User-Based and Decentralized IoT Service Provision. IEEE Access 8: 119961-119979 (2020) - [j18]Denis Hock, Martin Kappes, Bogdan Ghita:
Entropy-Based Metrics for Occupancy Detection Using Energy Demand. Entropy 22(7): 731 (2020) - [j17]Nikolaos Dalezios, Stavros Shiaeles, Nicholas Kolokotronis, Bogdan Ghita:
Digital forensics cloud log unification: Implementing CADF in Apache CloudStack. J. Inf. Secur. Appl. 54: 102555 (2020) - [c67]Besfort Shala, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita, Stavros Shiaeles:
Synergy of Trust, Blockchain and Smart Contracts for Optimization of Decentralized IoT Service Platforms. AINA 2020: 547-558 - [c66]Damir Dobric, Andreas Pech, Bogdan Ghita, Thomas Wennekers:
On the Relationship Between Input Sparsity and Noise Robustness in Hierarchical Temporal Memory Spatial Pooler. ESSE 2020: 187-193 - [c65]Olaf Reich, Erik Hübner, Bogdan Ghita, Matthias F. Wagner, Jörg Schäfer:
Performance Evaluation of Bluetooth in a Wireless Body Area Network for Practical Applications. SAM 2020: 1-5 - [c64]Olaf Reich, Erik Hübner, Bogdan Ghita, Matthias Wagner, Jörg Schäfer:
Bluetooth Performance Evaluation based on Notify for Real-time Body-Area Sensor Networks. MetroInd4.0&IoT 2020: 516-520 - [c63]Vasileios Koutsouvelis, Stavros Shiaeles, Bogdan Ghita, Gueltoum Bendiab:
Detection of Insider Threats using Artificial Intelligence and Visualisation. NetSoft 2020: 437-443 - [c62]Ievgeniia Kuzminykh, Bogdan Ghita, Stavros Shiaeles:
Comparative Analysis of Cryptographic Key Management Systems. NEW2AN/ruSMART (2) 2020: 80-94 - [c61]Ievgeniia Kuzminykh, Dan Shevchuk, Stavros Shiaeles, Bogdan Ghita:
Audio Interval Retrieval Using Convolutional Neural Networks. NEW2AN/ruSMART 2020: 229-240 - [i5]Ievgeniia Kuzminykh, Bogdan Ghita, Alexandr Silonosov:
Impact of Network and Host Characteristics on the Keystroke Pattern in Remote Desktop Sessions. CoRR abs/2012.03577 (2020) - [i4]Ievgeniia Kuzminykh, Bogdan Ghita, Jose M. Such:
The Challenges with Internet of Things for Business. CoRR abs/2012.03589 (2020)
2010 – 2019
- 2019
- [j16]Gueltoum Bendiab, Stavros Shiaeles, Samia Boucherkha, Bogdan V. Ghita:
FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management. Comput. Secur. 86: 270-290 (2019) - [j15]Nelson L. Santos, Salvatore Lentini, Enrico Grosso, Bogdan V. Ghita, Giovanni Luca Masala:
Performance analysis of data fragmentation techniques on a cloud server. Int. J. Grid Util. Comput. 10(4): 392-401 (2019) - [j14]Besfort Shala, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita, Stavros Shiaeles:
Novel trust consensus protocol and blockchain-based trust evaluation system for M2M application services. Internet Things 7 (2019) - [j13]Michael Steinheimer, Ulrich Trick, Bogdan V. Ghita:
Formal Application Description of Autonomous and Cooperative M2M Application Services. J. Commun. 14(1): 33-39 (2019) - [j12]Hussein Oudah, Bogdan V. Ghita, Taimur Bakhshi, Abdulrahman Alruban, David J. Walker:
Using Burstiness for Network Applications Classification. J. Comput. Networks Commun. 2019: 5758437:1-5758437:10 (2019) - [c60]Besfort Shala, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita, Stavros Shiaeles:
Trusted, Decentralized and Blockchain-Based M2M Application Service Provision. BWCCA 2019: 210-221 - [c59]Ali Edan Al-Issa, Abdelhak Bentaleb, Alcardo Alex Barakabitze, Thomas Zinner, Bogdan V. Ghita:
Bandwidth Prediction Schemes for Defining Bitrate Levels in SDN-enabled Adaptive Streaming. CNSM 2019: 1-7 - [c58]Ali Edan Al-Issa, Abdelhak Bentaleb, Thomas Zinner, Is-Haka Mkwawa, Bogdan V. Ghita:
BBGDASH: A Max-Min Bounded Bitrate Guidance for SDN Enabled Adaptive Video Streaming. ICIN 2019: 307-314 - [c57]Hussein Oudah, Bogdan V. Ghita, Taimur Bakhshi:
A Novel Features Set for Internet Traffic Classification using Burstiness. ICISSP 2019: 397-404 - [c56]Gregor Frick, Auberlin Paguem Tchinda, Besfort Shala, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita:
Requirements for a Distributed NFV Orchestration in a WMN-Based Disaster Network. ICT-DM 2019: 1-6 - [c55]Faisal Shaman, Bogdan V. Ghita, Nathan L. Clarke, Abdulrahman Alruban:
User Profiling Based on Application-Level Using Network Metadata. ISDFS 2019: 1-8 - [c54]Muna Al-Saadi, Bogdan V. Ghita, Stavros Shiaeles, Panagiotis G. Sarigiannidis:
A novel approach for performance-based clustering and anagement of network traffic flows. IWCMC 2019: 2025-2030 - [c53]Robert Shire, Stavros Shiaeles, Keltoum Bendiab, Bogdan V. Ghita, Nicholas Kolokotronis:
Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation. NEW2AN 2019: 65-76 - [c52]Aimilia Panagiotou, Bogdan V. Ghita, Stavros Shiaeles, Keltoum Bendiab:
FaceWallGraph: Using Machine Learning for Profiling User Behaviour from Facebook Wall. NEW2AN 2019: 125-134 - [c51]Christos Constantinides, Stavros Shiaeles, Bogdan V. Ghita, Nicholas Kolokotronis:
A Novel Online Incremental Learning Intrusion Prevention System. NTMS 2019: 1-6 - [c50]Nelson L. Santos, Bogdan V. Ghita, Giovanni Luca Masala:
Enhancing Data Security in Cloud using Random Pattern Fragmentation and a Distributed NoSQL Database. SMC 2019: 3735-3740 - [c49]Gregor Frick, Auberlin Paguem Tchinda, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita:
NFV Resource Advertisement and Discovery Protocol for a Distributed NFV Orchestration in a WMN-based Disaster Network. SoftCOM 2019: 1-6 - [i3]Michael Siracusano, Stavros Shiaeles, Bogdan V. Ghita:
Detection of LDDoS Attacks Based on TCP Connection Parameters. CoRR abs/1904.01508 (2019) - [i2]Muhammad Ali, Stavros Shiaeles, Maria Papadaki, Bogdan V. Ghita:
Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis. CoRR abs/1904.02100 (2019) - [i1]Aimilia Panagiotou, Bogdan V. Ghita, Stavros Shiaeles, Keltoum Bendiab:
A machine-learning approach to Detect users' suspicious behaviour through the Facebook wall. CoRR abs/1910.14417 (2019) - 2018
- [j11]Jims Marchang, Roderick Douglas, Bogdan V. Ghita, David Lancaster, Benjamin Sanders:
Dynamic Neighbour Aware Power-controlled MAC for Multi-hop Ad-hoc networks. Ad Hoc Networks 75-76: 119-134 (2018) - [j10]Samah Alshathri, Bogdan V. Ghita, Nathan L. Clarke:
Sharing with Live Migration Energy Optimization Scheduler for Cloud Computing Data Centers. Future Internet 10(9): 86 (2018) - [c48]Besfort Shala, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita, Stavros Shiaeles:
Blockchain-Based Trust Communities for Decentralized M2M Application Services. 3PGCIC 2018: 62-73 - [c47]Muhammad Ali, Stavros Shiaeles, Maria Papadaki, Bogdan V. Ghita:
Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis. GIIS 2018: 1-5 - [c46]Michael Siracusano, Stavros Shiaeles, Bogdan V. Ghita:
Detection of LDDoS Attacks Based on TCP Connection Parameters. GIIS 2018: 1-6 - [c45]Gregor Frick, A. Paguem Tchinda, Ulrich Trick, Armin Lehmann, Bogdan Vladimir Ghita:
Distributed NFV Orchestration in a WMN-Based Disaster Network. ICUFN 2018: 168-173 - [c44]Besfort Shala, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita, Stavros Shiaeles:
Trust-Based Composition of M2M Application Services. ICUFN 2018: 250-255 - [c43]Leith Abed, Nathan L. Clarke, Bogdan V. Ghita, Abdulrahman Alruban:
Securing Cloud Storage by Transparent Biometric Cryptography. SecITC 2018: 97-108 - 2017
- [j9]Jims Marchang, Bogdan V. Ghita, David Lancaster:
Location based transmission using a neighbour aware with optimized EIFS MAC for ad hoc networks. Ad Hoc Networks 63: 62-78 (2017) - [j8]Thomas Mansfield, Bogdan V. Ghita, Marcel Adrian Ambroze:
Signals of opportunity geolocation methods for urban and indoor environments. Ann. des Télécommunications 72(3-4): 145-155 (2017) - [j7]Michael Steinheimer, Ulrich Trick, Woldemar F. Fuhrmann, Bogdan V. Ghita, Gregor Frick:
M2M Application Service Provision: An Autonomous and Decentralised Approach. J. Commun. 12(9): 489-498 (2017) - [c42]Sameer Al-Obaidi, Marcel Ambroze, N. Outram, Bogdan V. Ghita:
Bit precision and Cyclic prefix effect on OFDM Power Consumption Estimation. ICCBN 2017: 36-40 - [c41]Besfort Shala, Patrick Wacht, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita, Stavros Shiaeles:
Framework for automated functional testing of P2P-based M2M applications. ICUFN 2017: 916-921 - [c40]Auberlin Paguem Tchinda, Gregor Frick, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita:
Performance analysis of WMN routing protocols for disaster networks. SCVT 2017: 1-6 - [c39]Besfort Shala, Patrick Wacht, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita, Stavros Shiaeles:
Trust Integration for Security Optimisation in P2P-Based M2M Applications. TrustCom/BigDataSE/ICESS 2017: 949-954 - [c38]Najwan Khambari, Bogdan V. Ghita, Lingfen Sun:
QoE-driven video enhancements in wireless networks through predictive packet drops. WiMob 2017: 355-361 - 2016
- [j6]Taimur Bakhshi, Bogdan V. Ghita:
On Internet Traffic Classification: A Two-Phased Machine Learning Approach. J. Comput. Networks Commun. 2016: 2048302:1-2048302:21 (2016) - [c37]Taimur Bakhshi, Bogdan V. Ghita:
Traffic Profiling: Evaluating Stability in Multi-device User Environments. AINA Workshops 2016: 731-736 - [c36]Hussain Alshamrani, Bogdan V. Ghita:
IP prefix hijack detection using BGP connectivity monitoring. HPSR 2016: 35-41 - [c35]Hussain Alshamrani, Bogdan V. Ghita:
Improving IP Prefix Hijacking Detection by Tracing Hijack Fingerprints and Verifying Them through RIR Databases. DCNET 2016: 57-63 - [c34]Taimur Bakhshi, Bogdan V. Ghita:
User-centric traffic optimization in residential software defined networks. ICT 2016: 1-6 - [c33]Sameer Al-Obaidi, Marcel Ambroze, Bogdan V. Ghita, Elias Giakoumidis, Athanasios Tsokaos:
A Review on Power Consumption Reduction Techniques on OFDM. INC 2016: 3-8 - [c32]Harald Frank, Woldemar F. Fuhrmann, Bogdan V. Ghita:
Mobile Edge Computing: Requirements for Powerful Mobile Near Real-Time Applications. INC 2016: 63-66 - [c31]Najwan Khambari, Bogdan V. Ghita, David Lancaster, Lingfen Sun:
QoE Enhancements in IEEE 802.11e EDCA for Video Transmission through Selective Queueing. INC 2016: 85-90 - [c30]Michael Steinheimer, Ulrich Trick, Woldemar F. Fuhrmann, Bogdan V. Ghita:
P2P-based M2M Community Applications. INC 2016: 115-120 - [c29]Patrick Wacht, Ulrich Trick, Woldemar F. Fuhrmann, Bogdan V. Ghita:
Efficient Test Case Derivation from Statecharts-based Models. INC 2016: 127-132 - [c28]Muhammad Dawood, Woldemar F. Fuhrmann, Bogdan V. Ghita:
Assay of Multipath TCP for Session Continuity in Distributed Mobility Management. INC 2016: 141-146 - [c27]Taimur Bakhshi, Bogdan V. Ghita:
User-Centric Network Provisioning in Software Defined Data Center Environment. LCN 2016: 289-297 - [c26]Denis Hock, Martin Kappes, Bogdan V. Ghita:
A Pre-clustering Method To Improve Anomaly Detection. SECRYPT 2016: 391-396 - [c25]Taimur Bakhshi, Bogdan V. Ghita:
OpenFlow-enabled user traffic profiling in campus software defined networks. WiMob 2016: 1-8 - [c24]Jims Marchang, Bogdan V. Ghita, David Lancaster:
Location Based Transmission Using a Neighbour Aware-Cross Layer MAC for Ad Hoc Networks. WWIC 2016: 15-27 - [e2]Sergej Alekseev, Paul Dowland, Bogdan V. Ghita, Oliver Schneider:
Eleventh International Network Conference, INC 2016, Frankfurt, Germany, July 19-21, 2016. Proceedings. Plymouth University 2016, ISBN 978-1-84102-410-3 [contents] - 2015
- [j5]Markus Glaab, Woldemar F. Fuhrmann, Joachim Wietzke, Bogdan V. Ghita:
Toward enhanced data exchange capabilities for the oneM2M service platform. IEEE Commun. Mag. 53(12): 42-50 (2015) - [c23]Jims Marchang, Bogdan V. Ghita, David Lancaster:
Queue utilization with hop based enhanced arbitrary inter frame spacing MAC for saturated ad HOC networks. Med-Hoc-Net 2015: 1-8 - 2014
- [c22]Muhammad Dawood, Woldemar F. Fuhrmann, Bogdan V. Ghita:
Assay of White Space Technology Standards for Vehicular Cognitive Access. INC 2014: 23-33 - [c21]Markus Glaab, Woldemar F. Fuhrmann, Joachim Wietzke, Bogdan V. Ghita:
A M2M-based Automotive Service Delivery Platform for Distributed Vehicular Applications. INC 2014: 35-45 - [c20]Thomas Mansfield, Bogdan V. Ghita, Marcel Adrian Ambroze:
Achieving Improved Network Subscriber Geo-Location. INC 2014: 107-116 - [e1]Paul Dowland, Steven Furnell, Bogdan V. Ghita:
Tenth International Network Conference, INC 2014, Plymouth, UK, July 8-10, 2014. Proceedings. Plymouth University 2014, ISBN 978-1-84102-373-1 [contents] - 2013
- [c19]Jims Marchang, Bogdan V. Ghita, David Lancaster:
Hop-Based dynamic fair scheduler for wireless Ad-Hoc networks. IEEE ANTS 2013: 1-6 - [c18]Sandra Frei, Woldemar F. Fuhrmann, Bogdan V. Ghita:
Framework for Generic Context- and Policy-Based Traffic Distribution in Heterogeneous Wireless Networks: Black Rider. AINA Workshops 2013: 534-541 - [c17]Patrick Wacht, Ulrich Trick, Woldemar F. Fuhrmann, Bogdan V. Ghita:
A new service description for communication services as basis for automated functional testing. FGCT 2013: 59-64 - [c16]Michael Steinheimer, Ulrich Trick, Woldemar F. Fuhrmann, Bogdan V. Ghita:
P2p-based community concept for M2M applications. FGCT 2013: 114-119 - [c15]Sandra Frei, Woldemar F. Fuhrmann, Bogdan V. Ghita:
Generic Real-Time Traffic Distribution Framework: Black Rider. ICCCN 2013: 1-8 - 2012
- [c14]Sandra Frei, Woldemar F. Fuhrmann, Andreas Rinkel, Bogdan V. Ghita:
Prospects for WLAN in the Evolved Packet Core Environment. NTMS 2012: 1-5 - [c13]Nathan L. Clarke, Vasilios Katos, Sofia-Anna Menesidou, Bogdan V. Ghita, Steven Furnell:
A Novel Security Architecture for a Space-Data DTN. WWIC 2012: 342-349 - 2011
- [c12]Mark E. Culverhouse, Bogdan V. Ghita, Paul L. Reynolds:
User-centric quality of service provisioning. LCN 2011: 35-41 - [c11]Mohamed Arabi, Bogdan V. Ghita:
Transmission rate control through MAC layer acknowledgements feedback. WMNC 2011: 1-7 - [c10]Armin Lehmann, Ulrich Trick, Woldemar F. Fuhrmann, Bogdan V. Ghita:
A new service description language as basis for service composition in SIP-based peer-to-peer infrastructures. WMNC 2011: 1-8 - [c9]Sandra Frei, Woldemar F. Fuhrmann, Andreas Rinkel, Bogdan V. Ghita:
Improvements to Inter System Handover in the EPC Environment. NTMS 2011: 1-5 - 2010
- [c8]Mark E. Culverhouse, Bogdan V. Ghita, Paul L. Reynolds, Xingang Wang:
Optimising Quality of Service through the controlled aggregation of traffic. ICITST 2010: 1-7 - [c7]Mohamed Arabi, Bogdan V. Ghita, Xingang Wang:
Improving Fairness in Ad Hoc Networks Through Collision Rate Control. INC 2010: 51-59 - [c6]Frank Weber, Woldemar F. Fuhrmann, Ulrich Trick, Udo Bleimann, Bogdan V. Ghita:
A Bootstrap Mechanism for NGN QoS Profiling. INC 2010: 61-70 - [c5]Thomas Eichelmann, Woldemar F. Fuhrmann, Ulrich Trick, Bogdan V. Ghita:
Enhanced Concept of the TeamCom SCE for Automated Generated Services Based on JSLEE. INC 2010: 75-84 - [c4]Sandra Frei, Woldemar F. Fuhrmann, Andreas Rinkel, Bogdan V. Ghita:
Signalling Effort Evaluation of Mobility Protocols within Evolved Packet Core Network. INC 2010: 99-108
2000 – 2009
- 2009
- [j4]Talal A. Edwan, Bogdan V. Ghita, Xingang Wang:
DSP-based bottleneck bandwidth estimation. Simul. Model. Pract. Theory 17(3): 538-547 (2009) - [c3]Stuart Cunningham, Vic Grout, Bogdan V. Ghita:
A Sample of Consumer Wi-Fi Use & Security in the UK. CNSR 2009: 386-390 - 2008
- [c2]Frank Weber, Woldemar F. Fuhrmann, Ulrich Trick, Udo Bleimann, Bogdan V. Ghita:
A Framework for Improved QoS Evaluation and Control in SIP-Based NGN. INC 2008: 27-37 - 2007
- [j3]C. J. Tucker, Steven Furnell, Bogdan V. Ghita, Phillip J. Brooke:
A new taxonomy for comparing intrusion detection systems. Internet Res. 17(1): 88-98 (2007) - [c1]Talal A. Edwan, Bogdan V. Ghita, Xingang Wang:
Bottleneck Bandwidth Estimation Using Frequency Analysis. ICCCN 2007: 1204-1209 - 2004
- [b1]Bogdan Vladimir Ghita:
Performance characterisation of IP networks. University of Plymouth, UK, 2004 - 2002
- [j2]Chukwuma U. Ngini, Steven Furnell, Bogdan V. Ghita:
Assessing the global accessibility of the Internet. Internet Res. 12(4): 329-338 (2002) - 2001
- [j1]Bogdan V. Ghita, Steven Furnell, Benn Lines, D. Le-Foll, Emmanuel C. Ifeachor:
Network quality of service monitoring for IP telephony. Internet Res. 11(1): 26-34 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 00:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint