Author:
Daim Tuğrul U.,Faili Zahra
Publisher
Springer International Publishing
Reference53 articles.
1. Agubor, C., Chukwudebe, G., & Nosiri, O. (2015). Security challenges to telecommunication networks: An overview of threats and preventive strategies. Cyberspace (CYBER-Abuja).
2. Alam, M., et al. (2018). Current and future trends in wireless communications protocols and technologies. Mobile Networks and Applications, 23(3), 377–381.
3. Alarcón, M. J., Zorzano, F. J., Jevtić, A., & Andina, D. (2008). Telecommunications network planning and maintenance. s.l., 12th World Multiconference on Systemics, Cybernetics and Informatics (WMSCI 2008). Orlando, USA, from 29 June–2 July.
4. Albert, K. D. (2018). Dignited. [Online]. Retrieved September 2018.
5. Anand, A., Muthukrishnan, C., Akella, A., & Ramjee, R. (2009). Redundancy in network traffic: findings and implications. ACM SIGMETRICS Performance Evaluation Review, 37(1), 37–48.