Author of the publication

Network recommendation based on route prediction and mobile tower localisation.

, , , and . CCNC, page 1-4. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy Efficient Key Management Protocols to Securely Confirm Intrusion Detection in Wireless Sensor Networks., and . WSAN, volume 264 of IFIP, page 149-160. Springer, (2008)Behavioral Analysis of Transport Layer Based Hybrid Covert Channel., and . CNSA, volume 89 of Communications in Computer and Information Science, page 83-92. Springer, (2010)Network recommendation based on route prediction and mobile tower localisation., , , and . CCNC, page 1-4. IEEE, (2018)Energy-efficient relaxed rekeying policies for distributed key management in sensor networks., and . Int. J. Ad Hoc Ubiquitous Comput., 4 (1): 3-12 (2009)Secure process migration in cloud for load balancing and energy efficiency., , , , and . Int. J. Cloud Comput., 3 (3): 288-314 (2014)Dynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters., , , , , , , and . CoRR, (2014)Cost-based recommendation of parameters for local differentially private data aggregation., , and . Comput. Secur., (2021)Design of Transport Layer Based Hybrid Covert Channel Detection Engine, , and . CoRR, (2011)Selection and Verification of Privacy Parameters for Local Differentially Private Data Aggregation., , and . ICISDM, page 84-89. ACM, (2021)Resilient Fog-Based Adaptive Traffic Control System., , , , and . ICCCNT, page 1-7. IEEE, (2023)