Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RSock: A resilient routing protocol for mobile Fog/Edge networks., , , , , , and . Ad Hoc Networks, (2022)Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis., , and . EICC, page 19-25. ACM, (2023)On Detecting Route Hijacking Attack in Opportunistic Mobile Networks., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 2516-2532 (May 2023)R-Drive: Resilient Data Storage and Sharing for Mobile Edge Computing Systems., , , , , , , and . CoRR, (2022)Traffic-and-resource-aware intrusion detection in wireless mesh networks., , and . Ad Hoc Networks, (2014)GPS Spoofing Attacks in FANETs: A Systematic Literature Review., , and . IEEE Access, (2023)A comprehensive survey on detection of sinkhole attack in routing over low power and Lossy network for internet of things., , and . Internet Things, (July 2023)An efficient pairwise key establishment scheme for Ad-Hoc Mobile Clouds., , , and . WiMob, page 627-634. IEEE Computer Society, (2015)Improving Recommender Systems by a Further Factorization of the Factor Matrices., , , , , , and . IEEE Access, (2023)Security attacks in Opportunistic Mobile Networks: A systematic literature review., , and . J. Netw. Comput. Appl., (January 2024)