Author of the publication

Preventing Colluding Identity Clone Attacks in Online Social Networks.

, , , , , , , and . ICDCS Workshops, page 187-192. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Routing algorithms in Ad-hoc Networks., , and . International Conference on Internet Computing, page 983-990. CSREA Press, (2002)A Framework For Policy Based Coordinated Adaptation in Mobile Systems., , and . International Conference on Wireless Networks, page 969-974. CSREA Press, (2004)Attribute Weighting: A Method of Applying Domain Knowledge in the Decision Tree Process., , and . CIKM, page 259-266. ACM, (1998)Using Candlestick Charting and Dynamic Time Warping for Data Behavior Modeling and Trend Prediction for MWSN in IoT., , , and . IEEE BigData, page 2884-2889. IEEE, (2018)Estimated replication of data in wireless sensor networks., , and . COMSWARE, page 107-110. IEEE, (2008)In-Network Trajectory Privacy Preservation., , , , , and . ACM Comput. Surv., 48 (2): 23:1-23:29 (2015)On Optimizing Compatible Security Policies in Wireless Networks., , and . EURASIP J. Wireless Comm. and Networking, (2006)Efficient VM placement with multiple deterministic and stochastic resources in data centers., , , and . GLOBECOM, page 2505-2510. IEEE, (2012)A future location-prediction replacement strategy for mobile computing environments., , , and . WCNC, page 2252-2260. IEEE, (2006)Game theoretic analysis of users and providers behavior in network under scarce resources., , , , and . ICNC, page 1149-1155. IEEE Computer Society, (2012)