Author of the publication

Proposal of a method to detect black hole attack in MANET.

, , and . ISADS, page 149-154. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A method for detecting service interactions., , , , and . IEEE Commun. Mag., 31 (8): 32-37 (1993)A route guidance system with personalized rerouting for reducing traveling time of vehicles in urban areas., and . ITSC, page 1541-1548. IEEE, (2014)Application of Synchronized Multi-Hop Protocol to time-variable multi-rate and multi-hop wireless network., and . APNOMS, page 1-6. IEEE, (2013)Automatic Route Shortening Based on Link Quality Classification in Ad Hoc Networks., and . ICSS, volume 240 of Advances in Intelligent Systems and Computing, page 345-354. Springer, (2013)Branch label based probabilistic packet marking for IP traceback., , and . ICON, page 467-474. IEEE, (2003)Keynote Address.. ICDCS Workshops, page 0-6. IEEE Computer Society, (2002)Reputation Scoring System Using an Economic Trust Model: A Distributed Approach to Evaluate Trusted Third Parties on the Internet., , and . AINA Workshops, page 730-737. IEEE Computer Society, (2013)Real-time urban traffic amount prediction models for dynamic route guidance systems., and . EURASIP J. Wirel. Commun. Netw., (2014)Time Slot Assignment for Maximum Bandwidth in a Mobile Ad Hoc Network., and . J. Commun., 2 (6): 56-64 (2007)Foreword for Special Section on Networks Software.. IEICE Trans. Commun., 90-B (4): 719 (2007)