Author of the publication

An Efficient Detection Mechanism Against Packet Faking Attack in Opportunistic Networks.

, , , and . FNSS, volume 523 of Communications in Computer and Information Science, page 84-100. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Detection Mechanism Against Packet Faking Attack in Opportunistic Networks., , , and . FNSS, volume 523 of Communications in Computer and Information Science, page 84-100. Springer, (2015)Aggregation of Interacting Criteria in Land Combat Vehicle Selection by Using Fuzzy Measures., , and . IEEE Trans. Fuzzy Syst., 30 (9): 3979-3989 (2022)Robust Pareto solutions for convex quadratic multiobjective optimization problems under data uncertainty., , , , , and . Ann. Oper. Res., 319 (2): 1533-1564 (2022)Packet Faking Attack: A Novel Attack and Detection Mechanism in OppNets., , , and . CIS, page 638-642. IEEE Computer Society, (2014)Capacity Analysis for aircrew Training Schools - estimating Optimal manpower flows under Time varying Policy and Resource Constraints., , , , and . WSC, page 2285-2296. IEEE, (2018)Catabolism attack and Anabolism defense: A novel attack and traceback mechanism in Opportunistic Networks., , , and . Comput. Commun., (2015)A mixed-integer linear programming approach for soft graph clustering., and . CoRR, (2019)Branch-and-cut-and-price for the cardinality-constrained multi-cycle problem in kidney exchange., and . Comput. Oper. Res., (2020)An exact method for minimizing the total treatment time in intensity-modulated radiotherapy., , and . JORS, 63 (10): 1447-1456 (2012)Identifying items for moderation in a peer assessment framework., , , , , and . Knowl. Based Syst., (2018)