Author of the publication

Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network.

, , , and . UbiSec, volume 1768 of Communications in Computer and Information Science, page 534-544. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sentiment Classification of Drug Reviews Using Fuzzy-rough Feature Selection., , , , , and . FUZZ-IEEE, page 1-6. IEEE, (2019)Deploying an agent-based architecture for the management of community care., , and . AAMAS, page 932-933. ACM, (2003)Microservices: Granularity vs. Performance., , and . UCC (Companion"), page 215-220. ACM, (2017)A Secure Connectivity Model for Internet of Things Analytics Service Delivery., and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 9-16. IEEE, (2018)A Multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service., , , and . CoRR, (2020)Securing Manufacturing Intelligence for the Industrial Internet of Things., , , and . ICICT (2), volume 1027 of Advances in Intelligent Systems and Computing, page 267-282. Springer, (2019)Developing a Learning Analytics Model to Explore Computer Science Student Motivation in the UK., , and . ICALT, page 442-444. IEEE, (2021)A Kuramoto Model Based Approach to Extract and Assess Influence Relations., , , and . ISICA, volume 575 of Communications in Computer and Information Science, page 464-473. Springer, (2015)Peer-to-Peer Networks and Collective Intelligence: The Case for Agency., and . 3PGCIC, page 357-362. IEEE Computer Society, (2010)Best Fit Missing Value Imputation (BFMVI) Algorithm for Incomplete Data in the Internet of Things., , and . IoTBDS, page 130-137. SCITEPRESS, (2020)