Author of the publication

A Feedforward Neural Network based Model to Predict Sub-optimal Path Attack in IoT-LLNs.

, , and . CCGRID, page 400-409. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traffic Convergence Detection in IoT LLNs: A Multilayer Perceptron based Mechanism., , , and . SSCI, page 1715-1722. IEEE, (2018)Migrating from RBAC to temporal RBAC., , , and . IET Inf. Secur., 11 (5): 294-300 (2017)Toward Implementing Spatio-Temporal RBAC Extensions., , , and . ICISS, volume 11952 of Lecture Notes in Computer Science, page 59-78. Springer, (2019)PAMMELA: Policy Administration Methodology using Machine Learning., , , , , , and . SECRYPT, page 147-157. SCITEPRESS, (2022)A Feedforward Neural Network based Model to Predict Sub-optimal Path Attack in IoT-LLNs., , and . CCGRID, page 400-409. IEEE, (2020)Designing an Efficient Delay Sensitive Routing Metric for IEEE 802.16 Mesh Networks., , , , , and . CoRR, (2013)The generalized temporal role mining problem., , , and . J. Comput. Secur., 23 (1): 31-58 (2015)Context-Aware Behavioral Fingerprinting of IoT Devices via Network Traffic Analysis., , , and . SECRYPT, page 335-344. SCITEPRESS, (2023)A novel blockchain based framework to secure IoT-LLNs against routing attacks., , and . Computing, 102 (11): 2445-2470 (2020)Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT., , , and . ANTS, page 1-6. IEEE, (2018)