Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust-Based Security for Decentralized Clustering in IoV., , , and . SmartNets, page 1-4. IEEE, (2024)GSTR: Secure multi-hop message dissemination in connected vehicles using social trust model., , , , and . Internet Things, (2019)Enabling Rural IoV Communication through Decentralized Clustering and Federated Learning., , , and . CCWC, page 228-234. IEEE, (2024)Decentralized Cluster Head Selection in IoV using Federated Deep Reinforcement Learning., , , and . CCNC, page 1-7. IEEE, (2024)A Comprehensive Systematic Review of Blockchain-based Intrusion Detection Systems., , , , and . AIIoT, page 605-611. IEEE, (2024)Routing protocols and architecture for disaster area network: A survey., , , , and . Ad Hoc Networks, (2019)Enhancing Security in VANETs with Sybil Attack Detection using Fog Computing., and . VTC Fall, page 1-6. IEEE, (2023)A Survey and Comparative Analysis of Methods for Countering Sybil Attacks in VANETs., , , and . CCWC, page 178-183. IEEE, (2024)Sybil Attack Detection in VANETs using Fog Computing and Beamforming., and . UEMCON, page 626-631. IEEE, (2023)DFCV: A Novel Approach for Message Dissemination in Connected Vehicles Using Dynamic Fog., , and . WWIC, volume 10866 of Lecture Notes in Computer Science, page 311-322. Springer, (2018)