Author of the publication

Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking.

, , , , , and . Comput. Networks, (November 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IFKMS: Inverse Function-based Key Management Scheme for IoT networks., , , and . J. Inf. Secur. Appl., (2022)An outlier ensemble for unsupervised anomaly detection in honeypots data., , , and . Intell. Data Anal., 24 (4): 743-758 (2020)A data-owner centric privacy model with blockchain and adapted attribute-based encryption for internet-of-things and cloud environment., , , and . Int. J. Inf. Comput. Secur., 17 (3/4): 261-284 (2022)Modeling and improving named data networking over IEEE 802.15.4., , and . Ann. des Télécommunications, 76 (11-12): 839-850 (2021)Virtualization Techniques: Challenges and Opportunities., , , , and . MSPN, volume 10026 of Lecture Notes in Computer Science, page 49-62. Springer, (2016)Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks., , , , , , and . PEMWN, page 1-6. IEEE, (2021)Predicting Vehicles' Positions Using Roadside Units: A Machine-Learning Approach., , , and . CSCN, page 1-6. IEEE, (2018)Handling Overload and Data-Relaxation Control in Distributed Real-Time Database Systems., , and . Int. J. Comput. Their Appl., 15 (3): 187-200 (2008)A near-autonomous and incremental intrusion detection system through active learning of known and unknown attacks., , , and . SPAC, page 374-379. IEEE, (2021)Demonstrating Liability and Trust Metrics for Multi-Actor, Dynamic Edge and Cloud Microservices., , , , , , , and . MobiCom, page 115:1-115:3. ACM, (2023)