Author of the publication

Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS).

, , , and . Comput. Commun., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An intrusion tolerant system for improving availability in smart grid control centers., and . ICON, page 434-440. IEEE, (2012)A Biologically Inspired Framework for Mitigating Epidemic and Pandemic Attacks in the NGMN., , and . WCNC, page 1-6. IEEE, (2010)Performance Evaluation of Backoff Misbehaviour in IEEE 802.11ah Using Evolutionary Game Theory., , , , and . VTC Spring, page 1-7. IEEE, (2019)An overview of attacks against digital watermarking and their respective countermeasures., , , and . CyberSec, page 265-270. IEEE, (2012)Forecasting-Based Sampling Decision for Accurate and Scalable Anomaly Detection., and . GLOBECOM, page 1-6. IEEE, (2009)Base station location optimisation in LTE using Genetic Algorithm., , , , and . ICTC, page 336-341. IEEE, (2013)Sustainable Peatland Management with IoT and Data Analytics., , , , , , , , and . PRO-VE, volume 629 of IFIP Advances in Information and Communication Technology, page 549-557. Springer, (2021)An Analysis of Periodogram Based on a Discrete Cosine Transform for Spectrum Sensing., , , , and . Wirel. Pers. Commun., 101 (3): 1261-1279 (2018)A Detection and Recovery Architecture Against DoS and Worm Attacks in NGMN., , and . ICC, page 1675-1679. IEEE, (2008)Medium access prioritizing in the heterogeneous low-rate wireless PANs., , , and . ISTT, page 35-40. IEEE, (2016)