Author of the publication

A 4-step Blockchain Equipped Approach to Energy Efficiency and Routing in Homing Pigeon Based Delay Tolerant Network.

, and . Wirel. Pers. Commun., 122 (3): 2081-2112 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survivable of multicast traffic grooming against single link failures in WDM mesh networks., and . ICADIWT, page 250-255. IEEE, (2014)MLP-GA based algorithm to detect application layer DDoS attack., and . J. Inf. Secur. Appl., (2017)On detecting acceptable air contamination in classrooms using low cost sensors., , , , , , , and . COMSNETS, page 484-487. IEEE, (2017)A 4-step Blockchain Equipped Approach to Energy Efficiency and Routing in Homing Pigeon Based Delay Tolerant Network., and . Wirel. Pers. Commun., 122 (3): 2081-2112 (2022)MEC-EnergySaver: Unleashing Efficiency Through D2D and Data Compression., , and . COMSNETS, page 551-557. IEEE, (2024)Implementing Dial-On-Demand Technique for Inter and Intra Cluster Communication in Energy Conserving Postbox Delay Tolerant Networks., , , , , and . CICBA (1), volume 1030 of Communications in Computer and Information Science, page 243-256. Springer, (2018)Detection of DDoS DNS Amplification Attack Using Classification Algorithm., , and . ICIA, page 81:1-81:6. ACM, (2016)Traffic Grooming in Hybrid Optical-WiMAX Mesh Networks., , and . FICTA, volume 404 of Advances in Intelligent Systems and Computing, page 467-477. Springer, (2015)Recent developments in Elastic Optical Networks Using Machine Learning., and . ICTON, page 1-3. IEEE, (2019)Distributed denial of service attack detection using Naive Bayes Classifier through Info Gain Feature Selection., , and . ICIA, page 54:1-54:9. ACM, (2016)