Lincy Elizebeth Jim

According to our database1, Lincy Elizebeth Jim authored at least 8 papers between 2015 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Enhanced MANET security using artificial immune system based danger theory to detect selfish nodes.
Comput. Secur., 2022

2019
Decision Tree based AIS strategy for Intrusion Detection in MANET.
Proceedings of the TENCON 2019, 2019

Improvised MANET Selfish Node Detection using Artificial Immune System based Decision Tree.
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019

2018
A Grudger Based AIS Approach to Coerce Selfish Node Cooperation in MANET.
Int. J. Netw. Secur., 2018

AIS Reputation Mechanism in MANET.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018

2017
Pain modelling in an artificial immune system based MANET.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

2016
Packet Storage Time attack - a novel routing attack in Mobile Ad hoc Networks.
Proceedings of the 26th International Telecommunication Networks and Applications Conference, 2016

2015
State analysis of Mobile Ad Hoc Network nodes.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015


  Loading...