Author of the publication

An Exhaustive Research on the Application of Intrusion Detection Technology in Computer Network Security in Sensor Networks.

, , , , , , and . J. Sensors, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Exhaustive Research on the Application of Intrusion Detection Technology in Computer Network Security in Sensor Networks., , , , , , and . J. Sensors, (2021)Analysis of Queuing Delay and Medium Access Distribution Over Wireless Multihop PANs., , and . IEEE Trans. Veh. Technol., 64 (7): 2972-2990 (2015)An Efficient Dynamic-Decision Based Task Scheduler for Task Offloading Optimization and Energy Management in Mobile Cloud Computing., , , , , , , and . Sensors, 21 (13): 4527 (2021)SEHIDS: Self Evolving Host-Based Intrusion Detection System for IoT Networks.. Sensors, 22 (17): 6505 (2022)Header compression scheme for IEEE 802.15.5., and . ISWCS, page 407-411. IEEE, (2011)A Hybrid Model of Hesitant Fuzzy Decision-Making Analysis for Estimating Usable-Security of Software., , , , , , and . IEEE Access, (2020)LLSFIoT: Lightweight Logical Security Framework for Internet of Things., , , , , , and . Wirel. Commun. Mob. Comput., (2021)Deeply Trained Real-Time Body Sensor Networks for Analyzing the Symptoms of Parkinson's Disease., , , , , , , , , and 1 other author(s). IEEE Access, (2022)LLDNet: A Lightweight Lane Detection Approach for Autonomous Cars Using Deep Learning., , , , , , and . Sensors, 22 (15): 5595 (2022)Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective., , , , , , , and . Symmetry, 12 (4): 598 (2020)