From post

SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks.

, , , , , , и . J. Supercomput., 74 (10): 5022-5040 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Impact of Quantum Computing on Security in Emerging Technologies., , , и . ICFNDS, стр. 171-176. ACM, (2021)Malware Prediction Using Tabular Deep Learning Models., , , , и . UKCI, том 1453 из Advances in Intelligent Systems and Computing, стр. 379-389. Springer, (2023)Aggregated Deep Convolutional Neural Networks for Multi-View 3D Object Retrieval., , и . ICUMT, стр. 1-5. IEEE, (2019)Multimodal Fusion for Disaster Event Classification on Social Media: A Deep Federated Learning Approach., , и . ICFNDS, стр. 758-763. ACM, (2023)A Shared Memory Method For Enhancing The HTNGH AlgorithmPerformance: Proposed Method., , и . ICFNDS, стр. 14:1-14:6. ACM, (2017)A Lightweight Two-Factor Authentication Scheme for Mobile Cloud Computing.. ICFNDS, стр. 29:1-29:7. ACM, (2019)Security Challenges Posed by Quantum Computing on Emerging Technologies.. ICFNDS, стр. 44:1. ACM, (2020)D-FAP: Dual-Factor Authentication Protocol for Mobile Cloud Connected Devices.. J. Sens. Actuator Networks, 9 (1): 1 (2020)Backshoring: Main Drives and Effects., , , и . ICFNDS, стр. 51:1-51:5. ACM, (2017)SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks., , , , , , и . J. Supercomput., 74 (10): 5022-5040 (2018)