A Review of Security Risks in the Mobile Telecommunication Packet Core Network (English)
- New search for: Khera, V.
- New search for: Fung, C.C.
- New search for: Chaisiri, S.
- New search for: Khera, V.
- New search for: Fung, C.C.
- New search for: Chaisiri, S.
- New search for: Papasratorn, Borworn
- New search for: Charoenkitkarn, Nipon
- New search for: Vanijja, Vajirasak
In:
Advances in information technology; Advances in information technology: 6th international conference, IAIT 2013
409
;
93-103
;
2013
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:A Review of Security Risks in the Mobile Telecommunication Packet Core Network
-
Contributors:Khera, V. ( author ) / Fung, C.C. ( author ) / Chaisiri, S. ( author ) / Papasratorn, Borworn / Charoenkitkarn, Nipon / Vanijja, Vajirasak
-
Conference:International conference; 6th, Advances in information technology; Advances in information technology: 6th international conference, IAIT 2013 ; 2013 ; Bangkok
-
Published in:Advances in information technology; Advances in information technology: 6th international conference, IAIT 2013 , 409 ; 93-103COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE , 409 ; 93-103
-
Publisher:
- New search for: Springer
-
Place of publication:Cham
-
Publication date:2013-01-01
-
Size:11 pages
-
Remarks:Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Mining Top-k Frequent/Regular Patterns Based on User-Given Trade-Off between Frequency and RegularityAmphawan, K. / Lenca, P. et al. | 2013
- 13
-
Cross-Media Analysis for Communication during Natural DisastersBackfried, G. / Gollner, J. / Quirchmayr, G. / Rainer, K. / Kienast, G. / Thallinger, G. / Schmidt, C. / Pfeiffer, M. / Meurers, C. / Peer, A. et al. | 2013
- 23
-
An Intelligent Cloud Cache Replacement SchemeBanditwattanawong, T. / Uthayopas, P. et al. | 2013
- 35
-
Exploring Video Steganography for Hiding Images Based on Similar Lifting Wavelet CoefficientsChurin, K. / Preechasuk, J. / Chantrapornchai, C. et al. | 2013
- 47
-
Rotor Time Constant Identification Approaches Based on Back-Propagation Neural Network for Indirect Vector Controlled Induction MachineDouiri, M.R. / Cherkaoui, M. et al. | 2013
- 58
-
Improving Multi-Floor Facility Layout Problems Using Systematic Layout Planning and SimulationHosseini, S.S. / Mirzapour, S.A. / Wong, K.Y. et al. | 2013
- 70
-
Icon Placement Regularization for Jammed Profiles: Applications to Web-Registered Personnel MiningKamiya, H. / Yokote, R. / Matsuyama, Y. et al. | 2013
- 80
-
A Paradigm Approach to Generate Trust Index Using 3C3G Framework for B2C E-Commerce WebsitesKaur, B. / Madan, S. et al. | 2013
- 93
-
A Review of Security Risks in the Mobile Telecommunication Packet Core NetworkKhera, V. / Fung, C.C. / Chaisiri, S. et al. | 2013
- 104
-
Efficient Code Obfuscation for AndroidKovacheva, A. et al. | 2013
- 120
-
Identifying Factors Influencing Hybrid Self-regulated and Collaborative Learning: Toward an End-User Training FrameworkKrompho, S. / Porrawatpreyakorn, N. et al. | 2013
- 131
-
Effect of Training Sample on Reconstructing 3D Face Shapes from Feature PointsMaghari, A.Y.A. / Venkat, I. / Liao, I.Y. / Belaton, B. et al. | 2013
- 141
-
Use of Multi-agent Based Platform for Providing Document-Centric Interoperability in the Realm of E-governmentMajeed, M.F. / Esichaikul, V. / No, M.e. et al. | 2013
- 150
-
Analysis of Optimization Techniques to Improve User Response Time of Web Applications and Their Implementation for MOODLEManchanda, P. et al. | 2013
- 162
-
Event-Driven Implementation of Layer-7 Load BalancerSasajima, T. / Nishizaki, S.-y. et al. | 2013
- 173
-
RFID Privacy and Security Risks: Italian Case StudyDe Vivo, M.C. / Polzonetti, A. / Tapanelli, P. et al. | 2013
- 184
-
Evaluating and Benchmarking the Interactions between a Humanoid Robot and a Virtual Human for a Real-World Social TaskRahman, S.M.M. et al. | 2013
- 198
-
Assessing the Differential Effect of Web Usability Dimensions on Perceived Usefulness of a B2C E-Commerce WebsiteSahi, G. / Madan, S. et al. | 2013
- 212
-
Modified Deformable Parts Model for Side Profile Facial Feature DetectionSetthawong, P. / Vanijja, V. et al. | 2013
- 221
-
Design of Disease Management System for Chronic Heart Failure: A Case Study from Advanced Heart Failure Clinic at King Chulalongkorn Memorial HospitalSookpalng, C. / Vanijja, V. et al. | 2013
- 232
-
Effect of Codec Bit Rate and Packet Loss on Thai Speech Recognition over IPTriyason, T. / Kanthamanon, P. et al. | 2013
- 242
-
A Comparative Study of VoIP Quality Measurement from G.711 and G.729 Using PESQ and Thai SpeechYochanang, K. / Daengsi, T. / Triyason, T. / Wuttidittachotti, P. et al. | 2013
- 256
-
A New Multi-sensor Track Association Approach Based on Intuitionistic Fuzzy ClusteringLingling, Z. / Xianglei, D. / Peijun, M. / Xiaohong, S. / Chunmei, S. et al. | 2013