Author of the publication

Mobile Networks A pull-based service replication protocol in mobile ad hoc networks.

, and . Eur. Trans. Telecommun., 18 (1): 1-11 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media., , , , , and . IEEE Access, (2022)Intertwined path formation and MAC scheduling for fast delivery of aggregated data in WSN., , , and . Comput. Networks, (2014)Trust models of internet of smart things: A survey, open issues, and future directions., , , and . J. Netw. Comput. Appl., (2019)Semi-structured and unstructured data aggregation scheduling in wireless sensor networks., , , , and . INFOCOM, page 2671-2675. IEEE, (2012)A Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks., and . IEEE Trans. Parallel Distributed Syst., 19 (7): 926-939 (2008)SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features., , and . Expert Syst. Appl., (September 2023)Low-Cost and Accurate Intra-flow Contention-Based Admission Control for IEEE 802.11 Ad Hoc Networks.. ADHOC-NOW, volume 5198 of Lecture Notes in Computer Science, page 401-412. Springer, (2008)Balancing the tradeoffs between scalability and availability in mobile ad hoc networks with a flat hashing-based location service., and . Ad Hoc Networks, 6 (7): 1013-1030 (2008)Keynote Speaker 6: Intrusion detection systems using machine learning for the security of autonomous vehicles.. SIN, page 1. IEEE, (2022)Android Malware Detection using Deep Learning on API Method Sequences., , , and . CoRR, (2017)