Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Next Generation Network Coding Technique for IoT., and . ICCCNT, page 1-6. IEEE, (2020)Acknowledgement-Based Trust Framework for Wireless Sensor Networks., , and . SPIT, volume 117 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 34-40. Springer, (2012)A comprehensive ensemble pruning framework based on dual-objective maximization trade-off., and . Knowl. Inf. Syst., 66 (9): 5335-5353 (September 2024)Fuzzy Based Trusted Ad Hoc On-demand Distance Vector Routing Protocol for MANET., and . WiMob, page 39. IEEE Computer Society, (2007)ECG-Signal Based Secret Key Generation (ESKG) Scheme for WBAN and Hardware Implementation., and . Wirel. Pers. Commun., 106 (4): 2037-2052 (2019)Collaborative Lightweight Trust Management Scheme for Wireless Sensor Networks., , and . Wireless Personal Communications, 80 (1): 117-140 (2015)Secure routing protocol for mobile ad-hoc networks., , , and . SCSC, page 725-731. Simulation Councils, Inc., (2007)Secure Communication over BSN Using Modified Feather Light Weight Block (MFLB) Cipher Encryption., and . J. Softw., 10 (8): 961-970 (2015)Energy Efficient Static Node Selection in Underwater Acoustic Wireless Sensor Network., and . Wirel. Pers. Commun., 107 (2): 709-727 (2019)MLGARTC: Machine Learning Based Genetic Approach in RSSI Tree Climbing Path Improvisation of the Mobile Anchor's Using K-Means Clustering of Wireless Sensor Network., and . CoMSO, volume 206 of Smart Innovation, Systems and Technologies, page 213-229. Springer, (2020)