Author of the publication

Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks.

, , , , and . International Conference on Wireless Networks, page 570-575. CSREA Press, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Priority regions for research on dryland cereals and legumes., , , , , , , , , and 3 other author(s). F1000Research, (2016)An empirical study of parallel solutions for GLCM calculation of diffraction images., and . EMBC, page 3969-3972. IEEE, (2016)Fuzzy Bayesian inference for mapping vague and place-based regions: a case study of sectarian territory., , , , , , , , and . Int. J. Geogr. Inf. Sci., 37 (8): 1765-1786 (2023)Fast client-server video summarization for continuous capture., and . ACM Multimedia, page 506-508. ACM, (2001)Artificial Intelligence and Design: A Mechanical Engineering View.. AAAI, page 872-871. Morgan Kaufmann, (1986)Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks., , , , and . International Conference on Wireless Networks, page 570-575. CSREA Press, (2003)Asymptotics of Generating the Symmetric and Alternating Groups.. Electron. J. Comb., (2005)The Degree of the Splitting Field of a Random Polynomial over a Finite Field., and . Electron. J. Comb., (2004)Experiments With Some Programs That Search Game Trees., and . J. ACM, 16 (2): 189-207 (1969)Experiments with the M & N tree-searching program., and . Commun. ACM, 13 (3): 147-154 (1970)