Author of the publication

A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs.

, , , , and . WiMob, page 608-612. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Skeletonization of gray-scale images by gray weighted distance transform., , and . Visual Information Processing, volume 3074 of SPIE Proceedings, page 224-228. SPIE, (1997)Polynomial morphological approach in pattern recognition., , and . Visual Information Processing, volume 4041 of SPIE Proceedings, page 146-153. SPIE, (2000)Automated Retinal Vessel Segmentation Using Gabor Filters and Scale Multiplication., , , and . IPCV, page 22-28. CSREA Press, (2006)Security Threat Analysis of SDN Switch Flow Table., , , and . ICCCN, page 1-2. IEEE, (2018)3-D vision algorithms based on polynomial representation(abstract and references only)., and . ACM Conference on Computer Science, page 636. ACM, (1991)Software Development: Image Processing by Template Polynomials., and . ACM Conference on Computer Science, page 281-287. ACM, (1990)Classification of Ultrasound Medical Images Using Distance Based Feature Selection and Fuzzy-SVM., , , and . IbPRIA, volume 6669 of Lecture Notes in Computer Science, page 176-183. Springer, (2011)Selection of optimal texture descriptors for retrieving ultrasound medical images., , , and . ISBI, page 10-16. IEEE, (2011)Iris Recognition with Support Vector Machines., and . ICB, volume 3832 of Lecture Notes in Computer Science, page 486-492. Springer, (2006)Advances in Detecting Parkinson's Disease., , and . ICMB, volume 6165 of Lecture Notes in Computer Science, page 306-314. Springer, (2010)