Publications

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All

CID-RPL: Clone ID Attack detection using Deep Neural Network for RPL-based IoT Networks

IET Communications | Vol. 19 | Issue 1 | 2025

DOI: https://doi.org/10.1049/cmu2.70067

Securing the Road Ahead: A Survey on Internet of Vehicles Security Powered by a Conceptual Blockchain-Based Intrusion Detection System for Smart Cities

Transactions on Emerging Telecommunications Technologies | Vol. 36 | Issue 4 | 2025

DOI: https://doi.org/10.1002/ett.70133

OBAME: Optimized Bio-inspired Algorithm to Maximize Search Efficiency in P2P Databases

Procedia Computer Science | Vol. 21 | Issue - | 2013

DOI: https://doi.org/10.1016/j.procs.2013.09.010