Author of the publication

A fuzzy logic and game theory based adaptive approach for securing opportunistic networks against black hole attacks.

, , and . Int. J. Commun. Syst., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Metric for the Activeness of a Class, , , , and . CoRR, (2012)Application of Fuzzy Mathematics to Speech-to-Text Conversion by Elimination of Paralinguistic Content, , , , and . CoRR, (2012)Misbehavior Detection in Cooperative Intelligent Transportation Systems using Temporal Fusion Transformer., , , and . ICDCN, page 431-437. ACM, (2023)Performance analysis of various routing protocols (proactive and reactive) for random mobility models of Adhoc networks., , , and . RAIT, page 331-335. IEEE, (2012)SMART: Secured and Mobility Aware Routing Technique for Opportunistic IoT Network in Smart Cities., , , and . J. Mobile Multimedia, 20 (2): 335-358 (2024)SEIR: A Stackelberg game based approach for energy-aware and incentivized routing in selfish Opportunistic Networks., , and . CISS, page 1-6. IEEE, (2017)A game theory based secure model against Black hole attacks in Opportunistic Networks., , and . CISS, page 1-6. IEEE, (2017)A Metric for the Activeness of a Distributed Object Oriented Component Library, , , and . CoRR, (2012)DolNet: A Division Of Labour Based Distributed Object Oriented Software Process Model, and . CoRR, (2012)Business Rules for Business Governance., , and . ICEIS (3), page 360-367. SciTePress, (2014)