Author of the publication

Securing Layer-2 Path Selection in Wireless Mesh Networks.

, , , and . WISA, volume 5379 of Lecture Notes in Computer Science, page 69-83. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MAES: Modified advanced encryption standard for resource constraint environments., , , and . SAS, page 1-6. IEEE, (2018)L-Boost: Identifying Offensive Texts From Social Media Post in Bengali., , , , , and . IEEE Access, (2021)Reliable data approximation in wireless sensor network., and . Ad Hoc Networks, 11 (8): 2470-2483 (2013)FabricNet: A Fiber Recognition Architecture Using Ensemble ConvNets., , , , and . CoRR, (2021)U-vectors: Generating clusterable speaker embedding from unlabeled data., , , , and . CoRR, (2021)Thermal-Aware Multiconstrained Intrabody QoS Routing for Wireless Body Area Networks., , , , and . Int. J. Distributed Sens. Networks, (2014)A Schedule-based Multi-channel MAC Protocol for Wireless Sensor Networks., , and . Sensors, 10 (10): 9466-9480 (2010)A Secure Message Percolation Scheme for Wireless Sensor Network., and . ICOIN, volume 5200 of Lecture Notes in Computer Science, page 554-563. Springer, (2007)Issues of Internet of Things (IoT) and an Intrusion Detection System for IoT Using Machine Learning Paradigm., , and . IJCCI, page 395-406. Springer, (2018)A Thresholded Gabor-CNN Based Writer Identification System for Indic Scripts., , , , , and . IEEE Access, (2021)