Author of the publication

Detection method to eliminate Sybil attacks in Vehicular Ad-hoc Networks.

, , , , and . Ad Hoc Networks, (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network., , and . Secur. Commun. Networks, (2019)MDFD: A multi-source data fusion detection framework for Sybil attack detection in VANETs., , , , and . Comput. Networks, (April 2023)FITIC: A Few-shot Learning Based IoT Traffic Classification Method., , , , and . ICCCN, page 1-10. IEEE, (2022)Unknown Malicious Executable Defection.. ISDA (2), page 202-207. IEEE Computer Society, (2008)Zen-tor: A Zero Knowledge Known-Unknown Traffic Classification Method., , and . GLOBECOM, page 885-890. IEEE, (2022)Trusted Computing Based Mobile DRM Authentication Scheme., , and . IAS, page 7-10. IEEE Computer Society, (2009)Intrusion Detection of Industrial Control System Based on Modbus TCP Protocol., , , , , , and . ISADS, page 156-162. IEEE Computer Society, (2017)Identifying malicious nodes in wireless sensor networks based on correlation detection., , , , , , and . Comput. Secur., (2022)BJUT at TREC 2014 Contextual Suggestion Track: Hybrid Recommendation Based on Open-web Information., , , , and . TREC, volume 500-308 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2014)Study and Implementation of Trust Evaluation Access Control Mechanism Based on XEN., , and . HPCC-ICESS, page 1276-1281. IEEE Computer Society, (2012)