Author of the publication

Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks.

, , , , and . International Conference on Wireless Networks, page 570-575. CSREA Press, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Location Privacy in Vehicular Communications and Applications., , and . IEEE Trans. Intell. Transp. Syst., 17 (9): 2658-2667 (2016)Knowing the Enemy at the Gates: Measuring Attacker Motivation., , , , and . Int. J. Interdiscip. Telecommun. Netw., 5 (2): 83-95 (2013)Optional dynamic bandwidth allocation based on playback tunnel to support video-on-demand service in virtual private networks., and . Comput. Commun., 24 (11): 1019-1030 (2001)Ransomware in Windows and Android Platforms., , , and . CoRR, (2020)Methodology for traffic modeling using two-state Markov-modulated Bernoulli process., , , and . Comput. Commun., 22 (13): 1266-1273 (1999)Secure Inter-Vehicle Vital Signal Communication via Short Dynamic Group Management., , and . Security and Management, page 415-421. CSREA Press, (2008)Intrusion Detection System for Wireless Sensor Networks., , , and . Security and Management, page 582-585. CSREA Press, (2008)A simple model of real-time flow aggregation., and . IEEE/ACM Trans. Netw., 11 (3): 422-435 (2003)Secure Routing in Wireless Mobile Ad Hoc Networks without the Support of Key Management Infrastructure., , and . International Conference on Wireless Networks, page 210-218. CSREA Press, (2004)An Intelligent Behavior-Based Ransomware Detection System For Android Platform., , , and . TPS-ISA, page 28-35. IEEE, (2019)