Author of the publication

A novel approach for mitigating gray hole attack in MANET.

, and . Wireless Networks, 24 (2): 565-579 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability., and . Wireless Networks, 26 (3): 1981-2011 (2020)Analytic evaluation of non-uniformities for coverage probability computation of randomly deployed wireless sensor network., and . Int. J. Sens. Networks, 34 (1): 1-14 (2020)Human pose estimation using deep learning: review, methodologies, progress and future research directions., , and . Int. J. Multim. Inf. Retr., 11 (4): 489-521 (2022)Load Adaptive and Priority Based MAC Protocol for Body Sensors and Consumer Electronic (CE) Devices., and . ICACDS (2), volume 906 of Communications in Computer and Information Science, page 88-97. Springer, (2018)Analysis and Simulation of Second-Order Statistics with Modified Characteristic Function Parameters in a Multipath Fading Environment., , and . Wireless Personal Communications, 100 (3): 851-862 (2018)Effect of Matrix Partitioning on Second Order Statistics of Fading Channels., , and . Wireless Personal Communications, 100 (3): 863-875 (2018)Particle swarm optimization-based energy efficient clustering protocol in wireless sensor network., and . Neural Comput. Appl., 33 (21): 14147-14165 (2021)Ensemble LOF-based detection of false data injection in smart grid demand response system., , and . Comput. Electr. Eng., (2024)Study on temperature (τ ) variation for SimCLR-based activity recognition., and . Signal Image Video Process., 16 (6): 1667-1672 (2022)An energy efficient cycle stealing algorithm for best effort services in wireless sensor networks., and . Int. J. Commun. Networks Distributed Syst., 12 (3): 275-298 (2014)