Author of the publication

Artificial intelligence empowered threat detection in the Internet of Things: A systematic review.

, , , and . Concurr. Comput. Pract. Exp., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimized Congestion Management Protocol for Healthcare Wireless Sensor Networks., , and . Wireless Personal Communications, 75 (1): 11-34 (2014)PDDRA: A new pre-fetching based dynamic data replication algorithm in data grids., and . Future Gener. Comput. Syst., 28 (4): 666-681 (2012)Load-balancing algorithms in cloud computing: A survey., , and . J. Netw. Comput. Appl., (2017)Analysis of vehicular mobility in a dynamic free-flow highway., and . Veh. Commun., (2017)CCTF: congestion control protocol based on trustworthiness of nodes in Wireless Sensor Networks using fuzzy logic., , and . Int. J. Ad Hoc Ubiquitous Comput., 8 (1/2): 54-63 (2011)Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model., , and . J. Supercomput., 73 (6): 2682-2704 (2017)QoS-aware service composition in cloud computing using data mining techniques and genetic algorithm., , and . J. Supercomput., 73 (4): 1387-1415 (2017)Game theory approach to peer-to-peer video streaming: a comprehensive survey., , , and . Int. J. Auton. Adapt. Commun. Syst., 11 (4): 333-364 (2018)De-centralised dynamic task scheduling using hill climbing algorithm in cloud computing environments., and . Int. J. Cloud Comput., 6 (1): 79-94 (2017)Formal verification approaches in the web service composition: A comprehensive analysis of the current challenges for future research., , and . Int. J. Commun. Syst., (2018)