Author of the publication

Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory.

, and . Mobile Data Management, page 112-121. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security through Collaboration in MANETs., , and . CollaborateCom, volume 10 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 696-714. Springer / ICST, (2008)Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion., , , and . Security and Communication Networks, (2017)Cyberspace Security for Future Internet., , , , and . Security and Communication Networks, (2018)Synergistic Based Social Incentive Mechanism in Mobile Crowdsensing., , and . WASA, volume 10874 of Lecture Notes in Computer Science, page 767-772. Springer, (2018)A Message Matching Routing Algorithm Based on Node Sociality in Opportunistic Networks., , and . IIKI, volume 129 of Procedia Computer Science, page 175-177. Elsevier, (2017)Android app recommendation approach based on network traffic measurement and analysis., , , and . ISCC, page 988-994. IEEE Computer Society, (2015)Data Center Heat Monitoring Using Wireless Sensor Networks., and . ACM Southeast Regional Conference, page 59: 1-59: 4. ACM, (2014)Trustworthy data management for wireless networks in Cyber-Physical Systems., and . IPCCC, page 1-2. IEEE Computer Society, (2013)SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks., , and . MILCOM, page 1102-1107. IEEE, (2011)A Prediction-Based Fair Replication Algorithm in Structured P2P Systems., , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 499-508. Springer, (2007)