Author of the publication

To Increase Survivability with Software Rejuvenation by Having Dual Base Station in WSN Environment.

, , and . ISPA Workshops, volume 4743 of Lecture Notes in Computer Science, page 1-10. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization., and . J. Comput. Sci. Technol., 24 (2): 339-346 (2009)Detection of DDoS attacks using optimized traffic matrix., , , and . Computers & Mathematics with Applications, 63 (2): 501-510 (2012)Genetic Algorithm to Improve SVM Based Network Intrusion Detection System., , and . AINA, page 155-158. IEEE Computer Society, (2005)Improving Fault Tolerance by Virtualization and Software Rejuvenation., , and . Asia International Conference on Modelling and Simulation, page 855-860. IEEE Computer Society, (2008)Self Organized Mobility in Nanosensor Network Based on Particle Swarm Optimization and Coverage Criteria., , and . NCM (1), page 636-641. IEEE Computer Society, (2008)Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack., , and . ARES, page 575-579. IEEE Computer Society, (2007)A Security Framework in RFID Multi-domain System., , and . ARES, page 1227-1234. IEEE Computer Society, (2007)Mobility Enhancement in Nanorobots by Using Particle Swarm Optimization Algorithm., , and . CIS (1), page 35-40. IEEE Computer Society, (2008)GBR: Grid Based Random Key Predistribution for Wireless Sensor Network., , and . ICPADS (2), page 310-315. IEEE Computer Society, (2005)Linux-Based System Modelling for Cyber-attack Simulation., , , and . AIS, volume 3397 of Lecture Notes in Computer Science, page 585-596. Springer, (2004)