From post

Machine Learning Based Approach to Detect Wormhole Attack in VANETs.

, , , и . AINA Workshops, том 927 из Advances in Intelligent Systems and Computing, стр. 651-661. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scalability of Correlation Clustering Through Constraint Reduction., , и . CODS, стр. 1-10. ACM, (2014)Distributed Service Level Flow Control and Fairness in Wireless Mesh Networks., и . IEEE Trans. Mob. Comput., 14 (11): 2229-2243 (2015)Amalgam: Distributed Network Control With Scalable Service Chaining., , , и . Networking, стр. 519-523. IEEE, (2020)Temporal link prediction in multi-relational network., , , и . World Wide Web, 21 (2): 395-419 (2018)Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity., , , , и . ICDCIT, том 11319 из Lecture Notes in Computer Science, стр. 422-439. Springer, (2019)Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol., , и . SIN, стр. 111-118. ACM, (2011)DisTree: A scheme for DHT., и . ICACCI, стр. 794-799. IEEE, (2013)Defense against outside attacks in wireless sensor networks., и . Comput. Commun., 31 (4): 818-826 (2008)Accuracy enhancement of equal segment based approximate adders., , и . IET Comput. Digit. Tech., 12 (5): 206-215 (2018)SAS: Seasonality Aware Social-Based Forwarder Selection in Delay Tolerant Networks., , , , и . I4CS, том 1139 из Communications in Computer and Information Science, стр. 245-265. Springer, (2020)