Author of the publication

Machine Learning Based Approach to Detect Wormhole Attack in VANETs.

, , , and . AINA Workshops, volume 927 of Advances in Intelligent Systems and Computing, page 651-661. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Consistent Coordination Decoupling in Tuple Space Based Mobile Middleware: Design and Formal Specifications., , and . ICDCIT, volume 7753 of Lecture Notes in Computer Science, page 220-231. Springer, (2013)An Active Intrusion Detection System for LAN Specific Attacks., , , , , , , and . AST/UCMA/ISA/ACN, volume 6059 of Lecture Notes in Computer Science, page 129-142. Springer, (2010)Machine Learning Based Approach to Detect Position Falsification Attack in VANETs., , , , and . ISEA-ISAP, volume 939 of Communications in Computer and Information Science, page 166-178. Springer, (2018)Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm., , , and . SocProS (2), volume 131 of Advances in Intelligent and Soft Computing, page 305-315. Springer, (2011)Accuracy enhancement of equal segment based approximate adders., , and . IET Comput. Digit. Tech., 12 (5): 206-215 (2018)Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol., , and . SIN, page 111-118. ACM, (2011)Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity., , , , and . ICDCIT, volume 11319 of Lecture Notes in Computer Science, page 422-439. Springer, (2019)DisTree: A scheme for DHT., and . ICACCI, page 794-799. IEEE, (2013)Managing Smart Home Appliances with Proof of Authority and Blockchain., , , and . I4CS, volume 1041 of Communications in Computer and Information Science, page 221-232. Springer, (2019)EQPR: Enhancing QoS in Named Data Networking using Priority and RTT Driven PIT Replacement Policy., , , and . ICC, page 1-7. IEEE, (2019)