Author of the publication

Machine Learning Based Approach to Detect Wormhole Attack in VANETs.

, , , and . AINA Workshops, volume 927 of Advances in Intelligent Systems and Computing, page 651-661. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalability of Correlation Clustering Through Constraint Reduction., , and . CODS, page 1-10. ACM, (2014)Amalgam: Distributed Network Control With Scalable Service Chaining., , , and . Networking, page 519-523. IEEE, (2020)Performance optimization in single channel directional multi-interface IEEE 802.11s EDCA using beam prioritization., , and . ICC, page 5451-5456. IEEE, (2012)Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity., , , , and . ICDCIT, volume 11319 of Lecture Notes in Computer Science, page 422-439. Springer, (2019)DisTree: A scheme for DHT., and . ICACCI, page 794-799. IEEE, (2013)Temporal link prediction in multi-relational network., , , and . World Wide Web, 21 (2): 395-419 (2018)Defense against outside attacks in wireless sensor networks., and . Comput. Commun., 31 (4): 818-826 (2008)Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm., , , and . SocProS (2), volume 131 of Advances in Intelligent and Soft Computing, page 305-315. Springer, (2011)SAS: Seasonality Aware Social-Based Forwarder Selection in Delay Tolerant Networks., , , , and . I4CS, volume 1139 of Communications in Computer and Information Science, page 245-265. Springer, (2020)An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks., , , , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 294-308. Springer, (2011)