Author of the publication

Generalized Intrusion Detection Mechanism for Empowered Intruders in Wireless Sensor Networks.

, , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Entropy landscape of solutions in the binary perceptron problem, , and . CoRR, (2013)Statistical physics of unsupervised learning with prior knowledge in neural networks., and . CoRR, (2019)Generalized Intrusion Detection Mechanism for Empowered Intruders in Wireless Sensor Networks., , , , and . IEEE Access, (2020)Location Privacy-Preserving Method Based on Historical Proximity Location., , , , and . Wirel. Commun. Mob. Comput., (2020)HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth., , , , , and . IEEE Access, (2020)Improving Path-Coverage for Moving Targets in Wireless Multimedia Sensor Networks., , , and . J. Commun., 9 (11): 843-850 (2014)Improved LDA Dimension Reduction Based Behavior Learning with Commodity WiFi for Cyber-Physical Systems., , , , and . ACM Trans. Cyber Phys. Syst., 3 (4): 38:1-38:19 (2019)RF-IDH: An intelligent fall detection system for hemodialysis patients via COTS RFID., , , and . Future Gener. Comput. Syst., (2020)Dynamic Idle Time Interval Scheduling for Hybrid Cloud Workflow Management System., , , , and . SMC, page 3596-3602. IEEE, (2018)An Adaptive Heuristic for Scheduling Dynamic and Fuzzy Jobs on Elastic Clouds., , and . CBD, page 7-12. IEEE, (2019)