Author of the publication

Detection of SYBIL Attack using Neighbour Nodes in Static WSN

, and . International Journal on Recent and Innovation Trends in Computing and Communication, 3 (4): 2428--2432 (April 2015)
DOI: 10.17762/ijritcc2321-8169.1504140

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessment Model for Software Maintenance Tools: A Conceptual Framework., , and . PACIS, page 51. AISeL, (1997)An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique, and . CoRR, (2012)Intelligent Search Engine-based Universal Description, Discovery and Integration for Web Service Discovery., and . J. Comput. Sci., 10 (9): 1798-1810 (2014)Extended-Randomized, Efficient, Distributed: a Dynamic Detection of clone Attacks in Static Wireless Sensor Networks., and . J. Comput. Sci., 10 (10): 1900-1907 (2014)A distributed approach to capacity allocation in logical networks., , and . Eur. J. Oper. Res., 203 (3): 737-748 (2010)A comparative study of fuzzy evolutionary techniques for footprint recognition and performance improvement using wavelet-based fuzzy neural network., and . Int. J. Comput. Appl. Technol., 48 (2): 95-105 (2013)Energy-efficient sustainable cluster based neighbor discovery technique for wireless networks with directional antennas., and . Clust. Comput., 20 (2): 1527-1534 (2017)Security Establishment in Cybersecurity Environment Using PSO Based Optimization., and . Wirel. Pers. Commun., 129 (3): 1807-1828 (April 2023)Modified LSB Method Using New Cryptographic Algorithm for Steganography., , and . SocProS, volume 236 of Advances in Intelligent Systems and Computing, page 591-600. Springer, (2012)Bandwidth trading under misaligned objectives: Decentralized measurement-based control., and . Comput. Networks, 52 (3): 475-492 (2008)