Author of the publication

Hybrid Mode of Operation Schemes for P2P Communication to Analyze End-Point Individual Behaviour in IoT.

, , , , , and . ACM Trans. Sens. Networks, 19 (2): 31:1-31:23 (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Experimental Comparison and Impact Analysis of Various RPL-Based IoT Security Threats Using Contiki Simulator., , , and . COMSNETS, page 111-116. IEEE, (2024)A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors., , , , , , and . ICETE (1), page 255-264. SciTePress, (2018)Graph-Based Symmetric Crypto-System for Data Confidentiality., , , , and . GLOBECOM, page 1-6. IEEE, (2018)Analytical Model for Sybil Attack Phases in Internet of Things., , , and . IEEE Internet of Things Journal, 6 (1): 379-387 (2019)Hybrid Mode of Operation Schemes for P2P Communication to Analyze End-Point Individual Behaviour in IoT., , , , , and . ACM Trans. Sens. Networks, 19 (2): 31:1-31:23 (May 2023)Hybrid Mode of Operations for RPL in IoT: A Systematic Survey., , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 3574-3586 (2022)Performance-based Comparative Analysis of Open Source Vulnerability Testing Tools for Web Database Applications., and . ICCCNT, page 1-5. IEEE, (2020)Node coloring based replica detection technique in wireless sensor networks., and . Wireless Networks, 20 (8): 2419-2435 (2014)A comparative analysis of node replica detection schemes in wireless sensor networks., and . J. Netw. Comput. Appl., (2016)Performance Comparison and Analysis of Slowloris, GoldenEye and Xerxes DDoS Attack Tools., , , , and . ICACCI, page 318-322. IEEE, (2018)