Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust and trust dynamic mobile gateway selection in heterogeneous VANET-UMTS network., , , , and . Veh. Commun., (2018)Performance analysis of black hole and worm hole attacks in MANETs., , and . Int. J. Commun. Networks Inf. Secur., (April 2022)Adaptive QoS-Aware Multi-Metrics Gateway Selection Scheme for Heterogenous Vehicular Network., , , , , , and . Syst., 10 (5): 142 (2022)The Usage of Internet of Things in Agriculture: The Role of Size and Perceived Value.. Informatica (Slovenia), (2022)Fuzzy Logic-based Trusted and Power-aware Routing Protocol in Mobile Ad-hoc Networks., , and . Int. J. Commun. Networks Inf. Secur., (2020)Vehicular communication ad hoc routing protocols: A survey., , and . J. Netw. Comput. Appl., (2014)Transfer learning and sentiment analysis of Bahraini dialects sequential text data using multilingual deep learning approach., , , and . Data Knowl. Eng., (2023)Human immune-based model for intrusion detection in mobile ad hoc networks., , , , , , , and . Peer-to-Peer Netw. Appl., 13 (3): 1046-1068 (2020)A comparison of various vehicular ad hoc routing protocols based on communication environments., , , and . ICUIMC, page 48. ACM, (2013)Mechanism to continue system availability during cyber threat scenario., , , , , and . IMCOM, page 92. ACM, (2017)