Author of the publication

Efficient key management for Big Data gathering in dynamic sensor networks.

, , and . ICNC, page 667-671. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards feasibility of Deep-Learning based Intrusion Detection System for IoT Embedded Devices., , and . CCNC, page 947-948. IEEE, (2022)A Blockchain-based Trust Management Approach for Connected Autonomous Vehicles in Smart Cities., , , and . CCWC, page 544-549. IEEE, (2019)Cluster-Based Dynamic Backup in Cognitive Radio Networks., and . ICNC, page 740-744. IEEE Computer Society, (2017)Physical Layer-Based IoT Security: An Investigation Into Improving Preamble-Based SEI Performance When Using Multiple Waveform Collections., , , , and . IEEE Access, (2022)Mitigating Eavesdropping Attack Using Secure Key Management Scheme in Wireless Mesh Networks., , and . J. Commun., 7 (8): 596-605 (2012)Self-protecting networking using dynamic p-cycle construction within link capacity constraint., , , and . Secur. Commun. Networks, 5 (6): 689-708 (2012)Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks., , , and . Secur. Commun. Networks, 6 (4): 539-547 (2013)Pre-print: Radio Identity Verification-based IoT Security Using RF-DNA Fingerprints and SVM., , , , and . CoRR, (2020)B2-C2: Blockchain-based Flow Control Consistency for Multi-Controller SDN Architecture., and . ICCE, page 1-6. IEEE, (2024)Denial of Service Attacks Prevention using Traffic Pattern Recognition over Software-Defined Network., and . EAI Endorsed Trans. Ambient Syst., 6 (18): e1 (2019)