Author of the publication

Attacks, Detection Mechanisms and Their Limits in Named Data Networking (NDN).

, , , , and . ICCSA (1), volume 13375 of Lecture Notes in Computer Science, page 310-323. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks., , , , , , and . PEMWN, page 1-6. IEEE, (2021)A Secure Data Storage in Multi-cloud Architecture Using Blowfish Encryption Algorithm., , , , and . AINA (2), volume 450 of Lecture Notes in Networks and Systems, page 398-408. Springer, (2022)A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture., , , , and . AINA (1), volume 449 of Lecture Notes in Networks and Systems, page 435-446. Springer, (2022)A Decentralized Blockchain-Based Platform for Secure Data Sharing in Cloud Storage Model., , , , , and . AINA (4), volume 202 of Lecture Notes on Data Engineering and Communications Technologies, page 338-348. Springer, (2024)Cache Pollution Attacks in the NDN Architecture: Impact and Analysis., , , , and . SoftCOM, page 1-6. IEEE, (2021)Monitoring a Rice Field with a Low-Cost Wireless Sensor Network., and . AINA (6), volume 204 of Lecture Notes on Data Engineering and Communications Technologies, page 261-272. Springer, (2024)Hybrid and Secure E-Health Data Sharing Architecture in Multi-Clouds Environment., , , and . ICOST, volume 12157 of Lecture Notes in Computer Science, page 249-258. Springer, (2020)A frame aggregation scheduler for QoS-sensitive applications in IEEE 802.11n WLANs., , , and . ICCIT, page 221-226. IEEE, (2012)DMRA-MCP: A Distributed Map-Reduce Applications Deployments in a Multi-Cloud Platform Based on Cloud Broker Architecture., , and . KES-IDT (1), volume 142 of Smart Innovation, Systems and Technologies, page 275-285. Springer, (2019)Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking., , , , , and . Comput. Networks, (November 2023)