Author of the publication

A comprehensive review on recent advancements in routing protocols for flying ad hoc networks.

, and . Trans. Emerg. Telecommun. Technol., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure blockchain framework for the internet of medical things., , and . Trans. Emerg. Telecommun. Technol., (January 2024)Automatic Attack Signature Generation Systems: A Review., and . IEEE Secur. Priv., 11 (6): 54-61 (2013)A comprehensive review on recent advancements in routing protocols for flying ad hoc networks., and . Trans. Emerg. Telecommun. Technol., (2022)Identifying bot infection using neural networks on DNS traffic., , and . J. Comput. Virol. Hacking Tech., 19 (4): 549-563 (November 2023)Detecting bot-infected machines using DNS fingerprinting., , and . Digital Investigation, 28 (Supplement): 14-33 (2019)Internet of Things (IoT), Applications and Challenges: A Comprehensive Review., and . Wireless Personal Communications, 114 (2): 1687-1762 (2020)Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks., and . Neural Comput. Appl., 32 (12): 7859-7877 (2020)PDD Algorithm for Balancing Medical Data., , , and . ICACDS (1), volume 905 of Communications in Computer and Information Science, page 260-269. Springer, (2018)Ensemble Technique Based on Supervised and Unsupervised Learning Approach for Intrusion Detection., and . ICACDS (1), volume 905 of Communications in Computer and Information Science, page 228-238. Springer, (2018)An Efficient Hybrid Approach Using Misuse Detection and Genetic Algorithm for Network Intrusion Detection., and . ICACDS (1), volume 905 of Communications in Computer and Information Science, page 218-227. Springer, (2018)