Author of the publication

Predicting model for identifying the malicious activity of nodes in MANETs.

, , , , , , and . ISCC, page 700-707. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Grouping detection and forecasting security controls using unrestricted cooperative bargains., , , , and . Comput. Commun., (2019)A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments., , , , , , and . Int. J. Inf. Secur. Priv., 16 (1): 1-16 (2022)Predicting model for identifying the malicious activity of nodes in MANETs., , , , , , and . ISCC, page 700-707. IEEE Computer Society, (2015)Analysis and handling of biased data provided by wireless sensor networks with lack of energy., , , , , , and . Int. J. Sens. Networks, 41 (3): 137-151 (2023)Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages., , , and . J. Cloud Comput., (2022)IoT6Sec: reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis., , , and . Wirel. Networks, 25 (4): 1533-1556 (2019)Energy-efficient node position identification through payoff matrix and variability analysis., , , , , , and . Telecommun. Syst., 65 (3): 459-477 (2017)Privacy-preserving cloud-connected IoT data using context-aware and end-to-end secure messages., , , and . FNC/MobiSPC, volume 191 of Procedia Computer Science, page 25-32. Elsevier, (2021)Applying multi-correlation for improving forecasting in cyber security., , , and . ICDIM, page 179-186. IEEE, (2011)