Author of the publication

An Efficient Detection And Management Of False Accusation Attacks In Hierarchical Ad-Hoc Networks.

, , and . KSII Trans. Internet Inf. Syst., 6 (7): 1874-1893 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Efficient Key Management Protocol for Wireless Sensor and Actor Networks, and . CoRR, (2009)Emoji at MoMA: Considering the 'original emoji' as art.. First Monday, (2018)A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology., , , , , and . J. Supercomput., 66 (2): 918-935 (2013)Galvanic Vestibular Stimulation: Data Analysis and Applications in Neurorehabilitation., , , , and . IEEE Signal Process. Mag., 38 (4): 54-64 (2021)Deep Transfer Learning for Parkinson's Disease Monitoring by Image-Based Representation of Resting-State EEG Using Directional Connectivity., , , , and . Algorithms, 15 (1): 5 (2022)A Blockchain-Based Mobile Crowdsensing and Its Incentive Mechanism., , , , and . WISA, volume 14402 of Lecture Notes in Computer Science, page 67-78. Springer, (2023)Community-Aware Transformer for Autism Prediction in fMRI Connectome., , , , and . MICCAI (8), volume 14227 of Lecture Notes in Computer Science, page 287-297. Springer, (2023)A State-Dependent IVA Model for Muscle Artifacts Removal From EEG Recordings., , , , and . IEEE Trans. Instrum. Meas., (2021)An Efficient Detection And Management Of False Accusation Attacks In Hierarchical Ad-Hoc Networks., , and . KSII Trans. Internet Inf. Syst., 6 (7): 1874-1893 (2012)Design of a Two Layered Blockchain-Based Reputation System in Vehicular Networks., and . IEEE Trans. Veh. Technol., 71 (2): 1209-1223 (2022)