Author of the publication

A Novel Efficient Dynamic Throttling Strategy for Blockchain-Based Intrusion Detection Systems in 6G-Enabled VSNs.

, , and . Sensors, 23 (18): 8006 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Keep Calm and Carry on with Cybersecurity @Home: A Framework for Securing Homeworking IT Environment., , , and . Int. J. Cyber Situational Aware., 5 (1): 1-25 (2020)AssemblyNet: A large ensemble of CNNs for 3D whole brain MRI segmentation., , , , , , , and . NeuroImage, (2020)Robust Shape Regularity Criteria for Superpixel Evaluation., , and . CoRR, (2019)Evaluation Framework of Superpixel Methods with a Global Regularity Measure., , and . CoRR, (2019)AssemblyNet: A large ensemble of CNNs for 3D Whole Brain MRI Segmentation., , , , , , , and . CoRR, (2019)Towards broader generalization of deep learning methods for multiple sclerosis lesion segmentation., , , , , and . CoRR, (2020)Exemplar-based Assignment of Large Missing Audio Parts using String Matching on Tonal Features., , , , and . ISMIR, page 507-512. University of Miami, (2011)On formal and automatic security verification of WSN transport protocols., and . IACR Cryptol. ePrint Arch., (2013)Equations aux différences partielles définies sur des graphes pour le traitement d'images et de données. (Partial difference equations over graphs for image and data processing).. University of Caen Normandy, France, (2009)SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains., , and . ICC, page 2073-2078. IEEE, (2013)