Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy harvesting and battery power based routing in wireless sensor networks., , , , and . Wireless Networks, 23 (1): 249-266 (2017)Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images., , , and . Symmetry, 8 (6): 41 (2016)Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-Points., , , and . Symmetry, 8 (7): 62 (2016)A Framework and Mathematical Modeling for the Vehicular Delay Tolerant Network Routing., , , , , , and . Mob. Inf. Syst., (2016)A hybrid approach for phishing web site detection., , and . The Electronic Library, 34 (6): 927-944 (2016)Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review., , , , and . J. Sensors, (2017)A review on feature selection in mobile malware detection., , , and . Digital Investigation, (2015)A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation., , , , , , and . Wireless Communications and Mobile Computing, 16 (16): 2663-2676 (2016)Low communication cost (LCC) scheme for localizing mobile wireless sensor networks., , , , and . Wireless Networks, 23 (3): 737-747 (2017)On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography., , and . IWDW, volume 5450 of Lecture Notes in Computer Science, page 342-349. Springer, (2008)