Author of the publication

WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs.

, , , , , and . J. Sensors, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Passive video forgery detection techniques: A survey., , , , , and . IAS, page 29-34. IEEE, (2014)A stiffness modeling methodology for simulation-driven design of haptic devices., , , and . Eng. Comput. (Lond.), 30 (1): 125-141 (2014)Contextual advertising using keyword extraction through collocation., , and . FIT, page 69:1-69:5. ACM, (2009)Towards knowledge modeling and manipulation technologies: A survey., , , , , , and . Int J. Information Management, 36 (6): 857-871 (2016)Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm., , , , , and . EURASIP J. Wireless Comm. and Networking, (2016)Survey on Network Virtualization Using OpenFlow: Taxonomy, Opportunities, and Open Issues., , , , , , and . TIIS, 10 (10): 4902-4932 (2016)Indoor human tracking mechanism using integrated onboard smartphones Wi-Fi device and inertial sensors., , , , , and . Telecommunication Systems, 71 (3): 447-458 (2019)From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions., , , , , , and . Algorithms, 10 (2): 39 (2017)Network forensics: Review, taxonomy, and open challenges., , , , and . J. Network and Computer Applications, (2016)On cloud security attacks: A taxonomy and intrusion detection and prevention as a service., , , , , , and . J. Network and Computer Applications, (2016)