Author of the publication

Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET.

, , and . CNSA, volume 89 of Communications in Computer and Information Science, page 181-190. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reduced cost location update scheme: a reactive approach for mobile agents., , and . HPCNCS, page 128-135. ISRST, (2007)Adaptive immune-inspired energy-efficient and high coverage cross-layer routing protocol for wireless sensor networks., , and . IET Commun., 14 (15): 2592-2600 (2020)A Comparative Study of Mobile Agent and Client-Server Technologies in a Real Application., and . COMAD, page 176-182. Computer Society of India, (2005)Towards scalable and load-balanced mobile agents-based data aggregation for wireless sensor networks., , and . Comput. Electr. Eng., (2017)CPN model for a Hierarchical Fault Tolerance Protocol for Mobile Agent systems., , and . ICON, page 1-6. IEEE, (2008)A Delay Abridged Judicious Cross-Layer Routing Protocol for Wireless Sensor Network., , and . ICCCS, page 634-638. IEEE, (2019)A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor Networks., and . CICSyN, page 102-107. IEEE Computer Society, (2009)Comparison of location management techniques for mobile agents., , and . ICON, page 1-5. IEEE, (2008)Species identification based on approximate matching., , and . Bangalore Compute Conf., page 30. ACM, (2011)A modified energy efficient protocol for optimization of dead nodes and energy consumption in wireless sensor networks., , and . ICST, page 1-6. IEEE, (2017)