Author of the publication

Detection and identification of attacks in Vehicular Ad-Hoc NETwork.

, and . WINCOM, page 58-62. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobility management schemes for real-time traffic and resource allocation in IEEE 802.16e mobile network., , , and . Int. J. Commun. Syst., (2017)Securing IoT Transactions Against Double-Spending Attacks based on Signaling Game Approach., , , and . GLOBECOM, page 1-6. IEEE, (2021)IEEE802.16 multi-class capacity including AMC scheme and QoS differentiation for initial and bandwidth request ranging., , and . VALUETOOLS, page 39. ICST/ACM, (2008)Implementation of Bit Error Rate Model of 16-QAM in Aqua-Sim Simulator for Underwater Sensor Networks., , and . UNet, volume 397 of Lecture Notes in Electrical Engineering, page 123-134. (2016)Best association of macro user in two-tier cellular networks., , and . WINCOM, page 1-6. IEEE, (2017)Gestion des ressources des réseaux mobiles de nouvelle génération par rapport à la mobilité des utilisateurs. (Resource allocation in the next generation networks with the mobility of the users).. University of Avignon, France, (2009)Decentralized Autonomous Underwater Vehicles Distribution for IPv6-UWSN: A Study With Heuristic Methods., , and . CommNet, page 1-9. IEEE, (2021)Secure and Privacy-Preserving E-mobility Service Based on Blockchain and Hybrid Smart Contracts., , and . IWCMC, page 333-338. IEEE, (2023)A Review: Collaborative Intrusion Detection for IoT integrating the Blockchain technologies., and . WINCOM, page 1-6. IEEE, (2020)Recent Advances in Data Intensive Applications: Survey., , and . WINCOM, page 1-6. IEEE, (2023)