Security attacks in Opportunistic Mobile Networks: A systematic literature review.
J. Netw. Comput. Appl., January, 2024
JamholeHunter: On detecting new wormhole attack in Opportunistic Mobile Networks.
J. Netw. Comput. Appl., 2024
Optimization Algorithms in Smart Grids: A Systematic Literature Review.
CoRR, 2023
A framework for privacy-aware and secure decentralized data storage.
Comput. Sci. Inf. Syst., 2023
Impact Study and Analysis of Hidden-mode of Wormhole Attack in Opportunistic Mobile Networks.
Proceedings of the 15th International Conference on Innovations in Information Technology, 2023
Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023
Designing a multi-epitope vaccine against <i>Chlamydia pneumoniae</i> by integrating the core proteomics, subtractive proteomics and reverse vaccinology-based immunoinformatics approaches.
,
,
,
,
,
,
,
,
,
,
Comput. Biol. Medicine, 2022
Secure and Privacy-Aware Blockchain Design: Requirements, Challenges and Solutions.
J. Cybersecur. Priv., March, 2021
A RESTful Privacy-Aware and Mutable Decentralized Ledger.
Proceedings of the New Trends in Database and Information Systems, 2021
OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment.
Multim. Tools Appl., 2020
Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges.
J. Netw. Comput. Appl., 2017
QoS-based MPLS multicast tree selection algorithms.
Proceedings of the FIT '09, 2009
Power consumption in wireless sensor networks.
Proceedings of the FIT '09, 2009