Author of the publication

Attack behavioural analysis and secure access for wireless Access Point (AP) in open system authentication.

, , and . IWCMC, page 741-746. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A study of Multi-Priority Opportunistic Directional Routing for VANET., , , and . WCSP, page 1-4. IEEE, (2010)Attack behavioural analysis and secure access for wireless Access Point (AP) in open system authentication., , and . IWCMC, page 741-746. IEEE, (2017)Enhanced Adaptive SNMPV6 for Mobile Devices., , and . CCECE, page 1753-1756. IEEE, (2006)Branch Prediction of Conditional Nested Loops through an Address Queue., , and . PDCS, page 97-102. ISCA, (2001)Selecting influential and trustworthy neighbors for collaborative filtering recommender systems., , , and . CCWC, page 1-7. IEEE, (2017)Heterogeneous information network embedding for user behavior analysis on social media., , , and . Neural Comput. Appl., 34 (7): 5683-5699 (2022)Network Coding for Applications in the Delay Tolerant Network (DTN)., , , and . MSN, page 376-380. IEEE Computer Society, (2009)TR-SDTN: Trust based efficient routing in hostile social DTNs., , and . ICC Workshops, page 1587-1592. IEEE, (2015)Span-based dependency-enhanced graph convolutional network for aspect sentiment triplet extraction., , , and . Neurocomputing, (January 2024)Role-Based Authority Control in Management Information System under the Background of Internet., , , , and . CIPAE, page 64-70. ACM, (2020)