关注
FESLIN ANISH MON
FESLIN ANISH MON
Lecturer
在 utas.edu.om 的电子邮件经过验证
标题
引用次数
引用次数
年份
Trust Model for IoT Using Cluster Analysis: A Centralized Approach
S Feslin Anish Mon, G Winster S, R Ramesh
Wireless Personal Communications, 1-22, 2021
15*2021
Logistic Regression Trust–A Trust Model for Internet-of-Things Using Regression Analysis
FA Mon, G Winster S, R S
Computer Systems Science and Engineering 44 (2), 1125-1142, 2023
82023
An Access Control Models In Cloud Computing: A Review
G Priya, BR Kavitha, G Ramya, P Kumaresan, FA Mon
International Journal of Pure and Applied Mathematics 116 (24), 539-548, 2017
42017
A Progression Based Method for the Detection of Black and Gray Hole Attacks in MANET
SF Mon, RK Shah, L Rajaji
International Journal of Computer Networking, Wireless and Mobile …, 2013
32013
Fog Level Trust for Internet of Things Devices Using Node Feedback Aggregation
FA Mon Solomon, GW Sathianesan
Journal of Computational and Theoretical Nanoscience 17 (5), 2181-2186, 2020
22020
Emerging Technologies and Applications for Cloud-based Gaming
PV Krishna
IGI Global, 2016
22016
Innovative shopping through mobile using Google’s ARCore
S kumar P, C prakash S, M Ajith kumar K, L shri, FAM K, Santhi
International Journal of Psychosocial Rehabilitation 24 (8), 12987-12993, 2020
2020
Smart Home Observing and Control Security System: A Case Study
MBBAM Priya G and Feslin Anish Mon K. Santhi, M. Deepa, M. Lawanya Shri
International Journal of Civil Engineering and Technology 9 (9), 1468-1477, 2018
2018
A Case Study on Commending User in Social Media Based on User Information and Rating of Product in Interface Forums
MBBAM G. Priya and Feslin Anish Mon Deepa .M, K. Santhi, M. Lawnyashri
International Journal of Civil Engineering and Technology 9 (9), 1478-1484, 2018
2018
Providing privacy and dimensional search on longitudinal data using safe computing: A case study
D M, K Santhi, L Shri M, MBBA Malar, P G, FA Mon
International Journal of Civil Engineering and Technology 9 (9), 315 - 322, 2018
2018
Balanced trust management for Ad Hoc Networks
SFA Mon, RK Saha, L Rajaji
2012 International Conference on Radar, Communication and Computing (ICRCC …, 2012
2012
Security Enhancement for Wi-Fi through multiple encryptions
P Jinesh, SF ANISH MON, T UGURLU
ICWN 2010: proceedings of the 2010 international conference on wireless …, 2010
2010
Recent research and development priorities on Aluminium Metal Matrix composites in the prospects of various processes
S Venkatesan, FA Mon
Chakraborty, M. 250 Chandrajit Pal 92 Chayan Halder 272 Chithra, B. 202
AS Garhwal, A Roy, P Adhavan, R Adhikary, AS Bhatt, A Varadarajan, ...
Moon 2000, 6, 0
Isolating Tainted Nodule
G Ramya, G Priya, SFA Mon
Imperial Journal of Interdisciplinary Research 2 (11), 0
DoS Attacker Identification in MANET IPv6 Using ICMPv6
SFA Mon, RK Saha, L Rajaji
系统目前无法执行此操作,请稍后再试。
文章 1–16