Author of the publication

Adaptive security design with malicious node detection in cluster-based sensor networks.

, , and . Computer Communications, 30 (11-12): 2385-2400 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integration of SDR and SDN for 5G., , , and . IEEE Access, (2014)A Rule-Based Dynamic Decision-Making Stock Trading System Based on Quantum-Inspired Tabu Search Algorithm., , , and . IEEE Access, (2014)Special Section: Grid and pervasive computing (selected papers from 2010 International Conference on Grid and Pervasive Computing)., and . Future Generation Comp. Syst., 27 (6): 820-822 (2011)IEEE 802.11 handoff latency improvement using Fuzzy Logic., , , and . Wireless Communications and Mobile Computing, 8 (9): 1201-1213 (2008)An energy-efficient utility-based distributed data routing scheme for heterogenous sensor networks., , , , and . Wireless Communications and Mobile Computing, 15 (16): 2020-2037 (2015)Quantum cryptography and its applications over the internet., , , , and . IEEE Network, 29 (5): 64-69 (2015)Special issue on emerging multimedia applications., , , and . Multimedia Tools Appl., 47 (3): 347-351 (2010)3PRS: a personalized popular program recommendation system for digital TV for P2P social networks., , , and . Multimedia Tools Appl., 47 (1): 31-48 (2010)Multipath design for 6LoWPAN ad hoc on-demand distance vector routing., , , and . IJITCC, 1 (1): 24-40 (2010)P2P architecture over IPv6 for personal internetworking., , , and . IJIPT, 1 (4): 214-220 (2006)