Author of the publication

Heuristic Approach for Stagnation Free Energy Aware Routing in Wireless Sensor Networks.

, , , and . Ad Hoc Sens. Wirel. Networks, 31 (1-4): 21-45 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster Abstract: BounceBack - A DDoS Attack Using Unsuspecting Accomplices in the Network., , , , and . INFOCOM Workshops, page 1-2. IEEE, (2021)PACED: Provenance-based Automated Container Escape Detection., , , , , , , , , and . IC2E, page 261-272. IEEE, (2022)Using SGX-Based Virtual Clones for IoT Security., , , , and . NCA, page 1-4. IEEE, (2018)The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web., , , , , and . INFOCOM, page 703-711. IEEE, (2019)Identifying the provenance of correlated anomalies., , , , , , and . SAC, page 224-229. ACM, (2011)WASEF: Web Acceleration Solutions Evaluation Framework., , , , , , , , , and 3 other author(s). CoRR, (2023)Forensic Analysis of Configuration-based Attacks., , , , , , and . NDSS, The Internet Society, (2022)FORTIFY: Software Defined Data Plane Resilience., , , , , , , and . NFV-SDN, page 6-12. IEEE, (2022)Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises., , , , , , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 287-310. Springer, (2017)Seeing is Believing: Exploring Perceptual Differences in DeepFake Videos., , , , , , , and . CHI, page 174:1-174:16. ACM, (2021)