Author of the publication

A Key Revocation Scheme for Mobile Sensor Networks.

, , and . ISPA Workshops, volume 4743 of Lecture Notes in Computer Science, page 41-49. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Genetic Algorithm to Improve SVM Based Network Intrusion Detection System., , and . AINA, page 155-158. IEEE Computer Society, (2005)Improving Fault Tolerance by Virtualization and Software Rejuvenation., , and . Asia International Conference on Modelling and Simulation, page 855-860. IEEE Computer Society, (2008)Self Organized Mobility in Nanosensor Network Based on Particle Swarm Optimization and Coverage Criteria., , and . NCM (1), page 636-641. IEEE Computer Society, (2008)GBR: Grid Based Random Key Predistribution for Wireless Sensor Network., , and . ICPADS (2), page 310-315. IEEE Computer Society, (2005)Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack., , and . ARES, page 575-579. IEEE Computer Society, (2007)A Security Framework in RFID Multi-domain System., , and . ARES, page 1227-1234. IEEE Computer Society, (2007)Detection of DDoS attacks using optimized traffic matrix., , , and . Computers & Mathematics with Applications, 63 (2): 501-510 (2012)Network-Based Intrusion Detection with Support Vector Machines., and . ICOIN, volume 2662 of Lecture Notes in Computer Science, page 747-756. Springer, (2003)Linux-Based System Modelling for Cyber-attack Simulation., , , and . AIS, volume 3397 of Lecture Notes in Computer Science, page 585-596. Springer, (2004)Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization., and . J. Comput. Sci. Technol., 24 (2): 339-346 (2009)