Author of the publication

Enhancements of the Dynamic TXOP Limit in EDCA Through a High-Speed Wireless Campus Network.

, , , , and . Wirel. Pers. Commun., 90 (4): 1647-1672 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs., , , , and . IEEE Access, (2021)A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem., , , , and . Int. J. Inf. Comput. Secur., 11 (4/5): 332-354 (2019)Mobility Support in IP Multicast: Proposals Review and Evaluation., , and . J. Mobile Multimedia, 3 (1): 3-14 (2007)Enhancements of the Dynamic TXOP Limit in EDCA Through a High-Speed Wireless Campus Network., , , , and . Wirel. Pers. Commun., 90 (4): 1647-1672 (2016)Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection., , , , , and . Multim. Tools Appl., 80 (20): 31381-31399 (2021)A Novel Multi-Agent and Multilayered Game Formulation for Intrusion Detection in Internet of Things (IoT)., , , , and . IEEE Access, (2020)An Adaptive and Viable Face Identification for Android Mobile Devices., , , , and . Handbook of Multimedia Information Security, Springer, (2019)Scrutinising internet banking security solutions., , , , and . Int. J. Inf. Comput. Secur., 12 (2/3): 269-302 (2020)A Game Theory-Based Strategic Approach to Ensure Reliable Data Transmission With Optimized Network Operations in Futuristic Mobile Adhoc Networks., , , , and . IEEE Access, (2020)Enhanced Clustering Routing Protocol for Power-Efficient Gathering in Wireless Sensor Network., , , , , and . Int. J. Commun. Networks Inf. Secur., (2012)