Author of the publication

Multivariate Skewness and Kurtosis for Detecting Wormhole Attack in VANETs.

, , , and . UNet, volume 13853 of Lecture Notes in Computer Science, page 284-295. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Performance Evaluation of VANET Routing Protocol Using a 2k Full Factorial Design., , , and . UNet, volume 12845 of Lecture Notes in Computer Science, page 31-41. Springer, (2021)A New Multivariate Approach for Real Time Detection of Routing Security Attacks in VANETs., , , and . Inf., 13 (6): 282 (2022)A Classification Proposal of VANET Applications in the Road Safety., , , and . UNet, volume 12845 of Lecture Notes in Computer Science, page 42-53. Springer, (2021)Inline detection of Denial of Service Attacks in Software Defined Networking using the Hotelling Chart., , and . EUSPN/ICTH, volume 160 of Procedia Computer Science, page 785-790. Elsevier, (2019)Range-Free Localization Approaches Based on Intelligent Swarm Optimization for Internet of Things., , , and . Inf., 14 (11): 592 (2023)A Novel Reaction Scheme against the MAC Layer Misbehavior in Mobile Ad Hoc Networks., , , and . EUSPN/ICTH, volume 98 of Procedia Computer Science, page 64-71. Elsevier, (2016)Multivariate Control Chart for the Detection of MAC Layer Misbehavior in Mobile ad Hoc Networks., , , and . ANT/SEIT, volume 83 of Procedia Computer Science, page 58-65. Elsevier, (2016)A new predictive approach for the MAC layer misbehavior in IEEE 802.11 networks., , , , and . Int. J. Pervasive Comput. Commun., 20 (2): 240-261 (2024)A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11., , , and . UNet, volume 10542 of Lecture Notes in Computer Science, page 38-47. Springer, (2017)Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators., , and . Int. J. Pervasive Comput. Commun., 19 (5): 734-755 (2023)