• Publications
  • Influence
A survey on detecting black hole attack in AODV-based mobile ad hoc networks
This paper presents a survey of current methods of detecting black hole attack against ad hoc on-demand distance vector routing protocol in mobile ad hoc networks. In a black hole attack, a maliciousExpand
  • 71
  • 2
  • Open Access
Analysis of Pattern Recognition Algorithms Using Associative Memory Approach: A Comparative Study between the Hopfield Network and Distributed Hierarchical Graph Neuron (DHGN)
In this paper, we conduct a comparative analysis of two associative memory-based pattern recognition algorithms. We compare the established Hopfield network algorithm with our novel DistributedExpand
  • 15
  • 1
Energy-Efficient Pattern Recognition Approach for Wireless Sensor Networks
  • M. Baqer, A.I. Khan
  • Computer Science
  • 3rd International Conference on Intelligent…
  • 1 December 2007
Event detection and monitoring is an important application class for wireless sensor networks. Traditionally, sensory data are collected and processed at the base-station. Conveying large amounts ofExpand
  • 9
  • 1
Dynamic data protocol exchange to handle passive attacks on trusted transient simple network (TTSN) transactions
The most difficult part of network security is protecting the traffic content from passive attacks. Passive attacks cannot be avoided because the data structure (data protocol) of InternetExpand
  • 3
  • 1
A parallel distributed application of the wireless sensor network
The paper describes the use of a wireless sensor network (WSN) for performing parallel pattern recognition computations. A complexity analysis indicates that the proposed algorithm is independent ofExpand
  • 27
A Distributed Hierarchical Graph Neuron-Based Classifier: An Efficient, Low-Computational Classifier
Many of the widely used classifiers are time consuming and resource intensive, and hence not practical to be used in the emerging wireless networks. We present an efficient classifier, termedExpand
  • 3
An agent based approach to discovery and formation of the serverless core network
We envision a pure P2P network that can manage itself without any means of a centralized entity, where peers can be discovered without backend servers and different types of P2P services can beExpand
  • 4
CDHT: a clustered DHT communication scheme for serverless (P2P) networks
The structured model or distributed hash table (DHT) based peer-to-peer (P2P) networks are favoured in research but not in real applications. It's argued that the unstructured model is more suitableExpand
  • 2
  • Open Access