Author of the publication

Performance Impact Analysis of Security Attacks on Cross-Layer Routing Protocols in Vehicular Ad hoc Networks.

, , , and . SoftCOM, page 1-6. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Q-Learning Based Forwarding Strategy in Named Data Networks., and . ICCSA (1), volume 12249 of Lecture Notes in Computer Science, page 434-444. Springer, (2020)A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking., , , , and . Comput., 11 (12): 186 (2022)Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking., , , , , and . Comput. Networks, (November 2023)Efficient forwarding strategy in a NDN-based internet of things., , and . Clust. Comput., 22 (3): 805-818 (2019)Vehicular Platoons Security: A Review with an Emphasis on Sybil Attacks., and . PEMWN, page 1-6. IEEE, (2023)Attacks, Detection Mechanisms and Their Limits in Named Data Networking (NDN)., , , , and . ICCSA (1), volume 13375 of Lecture Notes in Computer Science, page 310-323. Springer, (2022)Path Planning in UAV-Assisted Wireless Networks: A Comprehensive Survey and Open Research Issues., , , and . AINA (6), volume 204 of Lecture Notes on Data Engineering and Communications Technologies, page 286-297. Springer, (2024)Deep learning and handcrafted features for one-class anomaly detection in UAV video., , , and . Multim. Tools Appl., 80 (2): 2599-2620 (2021)Cognitive Radio and Dynamic TDMA for efficient UAVs swarm communications., , , and . Comput. Networks, (2021)Anomaly Detection in Connected and Autonomous Vehicles: A Survey, Analysis, and Research Challenges., , , , and . IEEE Access, (2024)