Author of the publication

An Exhaustive Research on the Application of Intrusion Detection Technology in Computer Network Security in Sensor Networks.

, , , , , , and . J. Sensors, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid diabetes disease prediction framework based on data imputation and outlier detection techniques., , and . Expert Syst. J. Knowl. Eng., (2022)Accent labeling algorithm based on morphological rules and machine learning in English conversion system., , and . J. Intell. Syst., 30 (1): 881-892 (2021)An intelligent WSN-UAV-based IoT framework for precision agriculture application., and . Comput. Electr. Eng., (2022)An improved item-based collaborative filtering using a modified Bhattacharyya coefficient and user-user similarity as weight., , and . Knowl. Inf. Syst., 64 (3): 665-701 (2022)A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks., , , , and . Wirel. Pers. Commun., 127 (2): 1045-1066 (2022)A novel approach to solve exact matching problem using multi-splitting of text patterns., , and . Int. J. Syst. Assur. Eng. Manag., 14 (4): 1457-1466 (August 2023)Machine Learning-based Software Effort Estimation: An Analysis., , , , , and . ECAI, page 1-6. IEEE, (2019)A threshold-based energy efficient military surveillance system using heterogeneous wireless sensor networks., , , and . Soft Comput., 27 (2): 1163-1176 (2023)A Method to Improve Exact Matching Results in Compressed Text using Parallel Wavelet Tree., , and . Scalable Comput. Pract. Exp., 22 (4): 387-400 (2021)A Novel Decentralized Blockchain Architecture for the Preservation of Privacy and Data Security against Cyberattacks in Healthcare., , , , , , , , , and . Sensors, 22 (15): 5921 (2022)