Author of the publication

An Enhanced Community-Based Routing with Ferry in Opportunistic Networks.

, , , and . IIKI, page 340-344. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security through Collaboration in MANETs., , and . CollaborateCom, volume 10 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 696-714. Springer / ICST, (2008)Synergistic Based Social Incentive Mechanism in Mobile Crowdsensing., , and . WASA, volume 10874 of Lecture Notes in Computer Science, page 767-772. Springer, (2018)Data Center Heat Monitoring Using Wireless Sensor Networks., and . ACM Southeast Regional Conference, page 59: 1-59: 4. ACM, (2014)Trustworthy data management for wireless networks in Cyber-Physical Systems., and . IPCCC, page 1-2. IEEE Computer Society, (2013)A Message Matching Routing Algorithm Based on Node Sociality in Opportunistic Networks., , and . IIKI, volume 129 of Procedia Computer Science, page 175-177. Elsevier, (2017)SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks., , and . MILCOM, page 1102-1107. IEEE, (2011)Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion., , , and . Secur. Commun. Networks, (2017)A Prediction-Based Fair Replication Algorithm in Structured P2P Systems., , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 499-508. Springer, (2007)Android app recommendation approach based on network traffic measurement and analysis., , , and . ISCC, page 988-994. IEEE Computer Society, (2015)Security and Privacy for Emerging IoT and CPS Domains., , , , , , and . CODASPY, page 336-337. ACM, (2022)