Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A lightweight hierarchical key management approach for internet of things., and . J. Inf. Secur. Appl., (June 2023)A novel selfish node detection based on reputation and game theory in Internet of Things., , , , and . Computing, 106 (1): 81-107 (January 2024)New clustering method to decrease probability of failure nodes and increasing the lifetime in WSNs, , and . CoRR, (2010)An adaptive traffic engineering approach based on retransmission timeout adjustment for software-defined networks., and . J. Ambient Intell. Humaniz. Comput., 15 (1): 739-750 (January 2024)Green Internet of Things (GIoT): Vision, applications and research challenges., and . Sustain. Comput. Informatics Syst., (2020)Localization in wireless sensor network by using mobile stations., , , and . BHI, page 277-280. IEEE, (2012)DFDM: Decentralized Fault Detection Mechanism to Improving Fault Management in Wireless Sensor Networks., , and . DICTAP (1), volume 166 of Communications in Computer and Information Science, page 685-692. Springer, (2011)A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection., and . Comput. Networks, (2018)Double Bits Error Correction Using CRC Method., , , and . SKG, page 254-257. IEEE Computer Society, (2009)Reliable Communication in Wireless Body Area Sensor Network for Health Monitoring, , , and . CoRR, (2011)