Author of the publication

A context-aware information-based clone node attack detection scheme in Internet of Things.

, , , , and . J. Netw. Comput. Appl., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering Algorithms for ITS Sequence Data with Alignment Metrics., , and . Australian Conference on Artificial Intelligence, volume 4304 of Lecture Notes in Computer Science, page 1027-1031. Springer, (2006)Ripple down rules: Turning knowledge acquisition into knowledge maintenance., , , , , , and . Artif. Intell. Medicine, 4 (6): 463-475 (1992)An Efficient Resource Monitoring Service for Fog Computing Environments., , , and . IEEE Trans. Serv. Comput., 13 (4): 709-722 (2020)Towards Interconnected Blockchains: A Comprehensive Review of the Role of Interoperability among Disparate Blockchains., , , , , , and . ACM Comput. Surv., 54 (7): 135:1-135:39 (2022)Blockchain: Trends and Future., , , , and . PKAW, volume 11016 of Lecture Notes in Computer Science, page 201-210. Springer, (2018)Knowledge Acquisition without Analysis., , , and . EKAW, volume 723 of Lecture Notes in Computer Science, page 277-299. Springer, (1993)A formally verified blockchain-based decentralised authentication scheme for the internet of things., , , and . J. Supercomput., 77 (12): 14461-14501 (2021)A context-aware information-based clone node attack detection scheme in Internet of Things., , , , and . J. Netw. Comput. Appl., (2022)A distributed case- and project-based learning to design 3D lab on electronic engineering education., , , and . Comput. Appl. Eng. Educ., 27 (2): 430-451 (2019)Towards a formal modelling, analysis and verification of a clone node attack detection scheme in the internet of things., , , and . Comput. Networks, (2022)