Author of the publication

Malicious node detection for the future network security from epistemic uncertainties.

, , , and . WPMC, page 1-6. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel misbehavior evaluation with dempster-shafer theory in wireless sensor networks., , and . MobiHoc, page 259-260. ACM, (2012)An Efficient and Secure Data Deduplication Scheme for Cloud Assisted Storage Systems with Access Control., , , and . TCCE, page 309-319. (2022)Malicious node detection for the future network security from epistemic uncertainties., , , and . WPMC, page 1-6. IEEE, (2013)A Novel Framework to Detect Anomalous Nodes to Secure Wireless Sensor Networks., , , , , and . AII, page 499-510. (2022)A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN., , and . TrustCom/ISPA/IUCC, page 688-693. IEEE Computer Society, (2013)Effective algorithm for protecting WSNs from internal attacks in real-time., , , , and . ACSW, page 40. ACM, (2016)Protecting wireless sensor networks from internal attacks based on uncertain decisions., , , and . WCNC, page 1854-1859. IEEE, (2013)An Energy Conserving Routing Scheme for Wireless Body Sensor Nanonetwork Communication., , , , and . CoRR, (2018)Outlier detection to Secure Wireless Sensor Networks Based on iForest., , and . ISDFS, page 1-6. IEEE, (2022)Smart integration of cloud computing and MCMC based secured WSN to monitor environment., , and . VITAE, page 1-5. IEEE, (2014)