Author of the publication

Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens.

, , , and . FGIT-FGCN (2), volume 120 of Communications in Computer and Information Science, page 441-449. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cancer Prognosis Prediction Using Balanced Stratified Sampling., , , , , and . CoRR, (2014)Statistical Analysis for Human Authentication Using ECG Waves., , , , , and . ICISTM, volume 141 of Communications in Computer and Information Science, page 287-298. Springer, (2011)Reputation System: Evaluating Reputation among All Good Sellers., , , and . WASSA@NAACL-HLT, page 115-121. The Association for Computer Linguistics, (2016)DeMalFier: Detection of Malicious web pages using an effective classifier., , , , , and . ICDSE, page 83-88. IEEE, (2014)Forecasting Stock Time-Series using Data Approximation and Pattern Sequence Similarity., , , , , , , and . CoRR, (2013)Aspect term extraction for sentiment analysis in large movie reviews using Gini Index feature selection method and SVM classifier., , , and . World Wide Web, 20 (2): 135-154 (2017)Dynamic Association Rule Mining using Genetic Algorithms., , , and . Intell. Data Anal., 9 (5): 439-453 (2005)SURF: Steganalysis using random forests., , and . ISDA, page 373-378. IEEE, (2010)Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens., , , and . FGIT-FGCN (2), volume 120 of Communications in Computer and Information Science, page 441-449. Springer, (2010)Mining Top - k Ranked Webpages Using Simulated Annealing and Genetic Algorithms., , , , and . AACC, volume 3285 of Lecture Notes in Computer Science, page 137-144. Springer, (2004)