Author of the publication

Coordinates and Bearing of Submerged Sensors Using a Single Mobile Beacon (CSMB).

, , and . J. Networks, 10 (8): 462-469 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Muthukkumarasamy, Vallipuram
add a person with the name Muthukkumarasamy, Vallipuram
 

Other publications of authors with the same name

Investigation of a Classification-based Technique to Detect Illicit Objects for Aviation Security., , , and . Artificial Intelligence and Applications, page 825-830. IASTED/ACTA Press, (2005)An energy efficient clique based clustering and routing mechanism in wireless sensor networks., , , and . IWCMC, page 171-176. IEEE, (2013)Burn-to-Claim: An asset transfer protocol for blockchain interoperability., , , and . Comput. Networks, (2021)A survey on blockchain-based platforms for IoT use-cases., , , , and . Knowledge Eng. Review, (2020)Substantiating Anomalies In Wireless Networks Using Group Outlier Scores., and . J. Softw., 6 (4): 678-689 (2011)Performance of Flow-based Anomaly Detection in Sampled Traffic., , , and . J. Networks, 10 (9): 512-520 (2015)Substantiating Security Threats Using Group Outlier Detection Techniques., and . GLOBECOM, page 2179-2184. IEEE, (2008)A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability., , and . IEEE Trans. Inf. Forensics Secur., 10 (2): 409-422 (2015)A Semantics-Aware Classification Approach for Data Leakage Prevention., , and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 413-421. Springer, (2014)Substantiating Unexpected Behavior of 802.11 Network Hosts., and . CCNC, page 292-296. IEEE, (2007)