Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis., , and . EICC, page 19-25. ACM, (2023)Optimization Algorithms in Smart Grids: A Systematic Literature Review., , and . CoRR, (2023)EdgeKeeper: resilient and lightweight coordination for mobile edge computing systems., , , , , , , and . MobiSys, page 577-578. ACM, (2022)CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks., , , and . CNS, page 73-81. IEEE, (2019)Traffic-and-resource-aware intrusion detection in wireless mesh networks., , and . Ad Hoc Networks, (2014)An efficient pairwise key establishment scheme for Ad-Hoc Mobile Clouds., , , and . WiMob, page 627-634. IEEE Computer Society, (2015)JamholeHunter: On detecting new wormhole attack in Opportunistic Mobile Networks., , and . J. Netw. Comput. Appl., (2024)EAR: Energy-aware risk-averse routing for disaster response networks., , , , , and . Ad Hoc Networks, (2020)On secure shared key establishment for mobile devices using contextual information., , and . IPCCC, page 1-10. IEEE Computer Society, (2015)Impact Study and Analysis of Hidden-mode of Wormhole Attack in Opportunistic Mobile Networks., , and . IIT, page 144-149. IEEE, (2023)