From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

RPL rank based-attack mitigation scheme in IoT environment., , , , и . Int. J. Commun. Syst., (2021)A Performance Evaluation of In-Memory Databases Operations in Session Initiation Protocol., , , и . Network, 3 (1): 1-14 (2023)A sensing-based patient classification framework for efficient patient-nurse scheduling., , , , и . Sustain. Comput. Informatics Syst., (апреля 2023)Operator calculus approach for route optimizing and enhancing wireless sensor network., , и . J. Netw. Comput. Appl., (2017)Security Against Rank Attack in RPL Protocol., , , и . IEEE Netw., 34 (4): 133-139 (2020)A multicast synchronization protocol for real time distributed systems., и . ICON, стр. 21-28. IEEE, (1999)Secure AODV Routing Protocol Based on Trust Mechanism., , , и . Wireless Networks and Security, Springer, (2013)An Efficient Outlier Detection and Classification Clustering-Based Approach for WSN., , , и . GLOBECOM, стр. 1-6. IEEE, (2021)A Synchronization Protocol for Group Communication Systems., и . MASCOTS, стр. 322-329. IEEE Computer Society, (1999)Heterogeneous key management protocol for secure group communications in MANETS., , , и . MWCN, стр. 51-55. IEEE, (2007)