Author of the publication

Maximise unsafe path routing protocol for forest fire monitoring system using Wireless Sensor Networks.

, , , , , and . NESEA, page 1-8. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Detection of Changes in Computer Network Measurements using Wavelets., and . ICCCN, page 1223-1227. IEEE, (2007)Approximate wireless sensor network health monitoring., and . IWCMC, page 376-381. ACM, (2007)On the Design of Forgiving Biometric Security Systems., , and . iNetSeC, volume 309 of IFIP Advances in Information and Communication Technology, page 1-8. Springer, (2009)A hybrid simulator for an ATM network., and . Int. J. Commun. Syst., 13 (2): 179-184 (2000)Automatic Dataset Labelling and Feature Selection for Intrusion Detection Systems., , and . MILCOM, page 46-51. IEEE, (2014)Detecting security threats in the network core using Data Mining techniques., , and . NOMS, IEEE, (2006)Tracking sensor node operation deviations in wireless sensor networks., and . PM2HW2N, page 84-87. ACM, (2007)On the treatment of video cell loss in the transmission of motion-JPEG and JPEG images., , and . Comput. Graph., 18 (1): 11-19 (1994)Adding contextual information to Intrusion Detection Systems using Fuzzy Cognitive Maps., , , and . CogSIMA, page 180-186. IEEE, (2016)Node connectivity index as mobility metric for GA based QoS routing in MANET., and . Mobility Conference, page 104-111. ACM, (2007)