Author of the publication

Intrusion detection system for PS-Poll DoS attack in 802.11 networks using real time discrete event system.

, , , and . IEEE CAA J. Autom. Sinica, 4 (4): 792-808 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modular approach for anomaly based NIDS., and . COMSWARE, page 1-6. IEEE, (2006)Scalability of Correlation Clustering Through Constraint Reduction., , and . CODS, page 1-10. ACM, (2014)Consistent Coordination Decoupling in Tuple Space Based Mobile Middleware: Design and Formal Specifications., , and . ICDCIT, volume 7753 of Lecture Notes in Computer Science, page 220-231. Springer, (2013)Amalgam: Distributed Network Control With Scalable Service Chaining., , , and . Networking, page 519-523. IEEE, (2020)Machine Learning Based Approach to Detect Position Falsification Attack in VANETs., , , , and . ISEA-ISAP, volume 939 of Communications in Computer and Information Science, page 166-178. Springer, (2018)Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm., , , and . SocProS (2), volume 131 of Advances in Intelligent and Soft Computing, page 305-315. Springer, (2011)Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol., , and . SIN, page 111-118. ACM, (2011)An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks., , , , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 294-308. Springer, (2011)Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity., , , , and . ICDCIT, volume 11319 of Lecture Notes in Computer Science, page 422-439. Springer, (2019)DisTree: A scheme for DHT., and . ICACCI, page 794-799. IEEE, (2013)