Author of the publication

Hybrid Mode of Operations for RPL in IoT: A Systematic Survey.

, , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 3574-3586 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analytical Model for Sybil Attack Phases in Internet of Things., , , and . IEEE Internet of Things Journal, 6 (1): 379-387 (2019)An Experimental Comparison and Impact Analysis of Various RPL-Based IoT Security Threats Using Contiki Simulator., , , and . COMSNETS, page 111-116. IEEE, (2024)A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors., , , , , , and . ICETE (1), page 255-264. SciTePress, (2018)Graph-Based Symmetric Crypto-System for Data Confidentiality., , , , and . GLOBECOM, page 1-6. IEEE, (2018)Node coloring based replica detection technique in wireless sensor networks., and . Wireless Networks, 20 (8): 2419-2435 (2014)Performance-based Comparative Analysis of Open Source Vulnerability Testing Tools for Web Database Applications., and . ICCCNT, page 1-5. IEEE, (2020)Hybrid Mode of Operations for RPL in IoT: A Systematic Survey., , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 3574-3586 (2022)Comparison of Nikto and Uniscan for measuring URL vulnerability., , and . ICCCNT, page 1-6. IEEE, (2019)A Secure RPL Rank Computation and Distribution Mechanism for Preventing Sinkhole Attack in IoT-based Systems., , and . INFOCOM Workshops, page 1-6. IEEE, (2023)A Key Renewal Model for Wireless Sensor Network Under Node Capture Attack., and . ICETET, page 301-305. IEEE Computer Society, (2011)