Author of the publication

Recommendation Based Trust Model with an Effective Defence Scheme for MANETs.

, , , and . IEEE Trans. Mob. Comput., 14 (10): 2101-2115 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An empirical study of hyperheuristics for managing very large sets of low level heuristics., , , , and . J. Oper. Res. Soc., 63 (3): 392-405 (2012)Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies., , , and . Cogn. Comput., 2 (3): 242-253 (2010)A Novel Weighted Fusion Based Efficient Clustering for Improved Wi-Fi Fingerprint Indoor Positioning., , and . IEEE Trans. Wirel. Commun., 22 (7): 4461-4474 (July 2023)A Dynamic and Scalable User-Centric Route Planning Algorithm Based on Polychromatic Sets Theory., , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (3): 2762-2772 (2022)ROI image retrieval based on multiple features of mean shift and expectation-maximisation., , and . Digit. Signal Process., (2015)Evolution of Cooperation in an Incentive Based Business Game Environment, , and . CoRR, (2013)Improving Metaheuristic Performance by Evolving a Variable Fitness Function., , , and . EvoCOP, volume 4972 of Lecture Notes in Computer Science, page 170-181. Springer, (2008)Evolution of Fitness Functions to Improve Heuristic Performance., , , and . LION, volume 5313 of Lecture Notes in Computer Science, page 206-219. Springer, (2007)Suspicious Traffic Detection in SDN with Collaborative Techniques of Snort and Deep Neural Networks., , and . HPCC/SmartCity/DSS, page 915-920. IEEE, (2018)Modelling Intelligent Phishing Detection System for E-banking Using Fuzzy Data Mining., , , and . CW, page 265-272. IEEE Computer Society, (2009)