Self-managed and blockchain-based vehicular ad-hoc networks B Leiding, P Memarmoshrefi, D Hogrefe Proceedings of the 2016 ACM international joint conference on pervasive and …, 2016 | 234 | 2016 |
A survey of ant colony optimization based routing protocols for mobile ad hoc networks H Zhang, X Wang, P Memarmoshrefi, D Hogrefe IEEE access 5, 24139-24161, 2017 | 109 | 2017 |
Deception, identity, and security: the game theory of sybil attacks W Casey, A Kellner, P Memarmoshrefi, JA Morales, B Mishra Communications of the ACM 62 (1), 85-93, 2018 | 19 | 2018 |
Bio-inspired self-organized public key authentication mechanism for mobile ad-hoc networks P Memarmoshrefi, R Seibel, D Hogrefe Bio-Inspired Models of Network, Information, and Computing Systems: 5th …, 2012 | 13 | 2012 |
Autonomous ant-based public key authentication mechanism for mobile ad-hoc networks P Memarmoshrefi, R Seibel, D Hogrefe Mobile Networks and Applications 21, 149-160, 2016 | 11 | 2016 |
LbSP: Load-balanced secure and private autonomous electric vehicle charging framework with online price optimization Y Yuan, Y Yuan, P Memarmoshrefi, T Baker, D Hogrefe IEEE Internet of Things Journal 9 (17), 15685-15696, 2022 | 10 | 2022 |
Social insect-based sybil attack detection in mobile ad-hoc networks P Memarmoshrefi, H Zhang, D Hogrefe Proceedings of the 8th International Conference on Bioinspired Information …, 2014 | 9 | 2014 |
Autonomous Group-Based Authentication Mechanism in Mobile Ad Hoc Networks P Memarmoshrefi, O Alfandi, A Kellner, D Hogrefe 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 8 | 2012 |
Identity deception and game deterrence via signaling games W Casey, P Memarmoshrefi, A Kellner, JA Morales, B Mishra Proceedings of the 9th EAI International Conference on Bio-inspired …, 2016 | 6 | 2016 |
Investigation of a bio-inspired security mechanism in Mobile Ad hoc Networks P Memarmoshrefi, H Zhang, D Hogrefe 2013 IEEE 9th International Conference on Wireless and Mobile Computing …, 2013 | 6 | 2013 |
Investigating the learning phase of an autonomous authentication in mobile ad-hoc networks H Zhang, P Memarmoshrefi, F Ashrafi, D Hogrefe proceedings of the 9th EAI International Conference on Bio-inspired …, 2016 | 2 | 2016 |
Transmission power-control certificate omission in vehicular ad hoc networks EC Dapaah, P Memarmoshrefi, D Hogrefe International Conference on Ad Hoc Networks, 164-176, 2020 | 1 | 2020 |
Advances on Bio-inspired Information, Communication and Computational Systems J Suzuki, P Memarmoshrefi, T Nakano Mobile Networks and Applications 21, 127-129, 2016 | 1 | 2016 |
Cluster images with AntClust: a clustering algorithm based on the chemical recognition system of ants WG Oed, P Memarmoshrefi International Conference on Metaheuristics and Nature Inspired Computing …, 2023 | | 2023 |
An AI-Based Transmission Power-Control Certificate Omission in Vehicular Ad-Hoc Networks EC Dapaah, P Memarmoshrefi, D Hogrefe International Conference on Ad Hoc Networks, 173-187, 2021 | | 2021 |
Proposing a Distributed and Dynamic Bio-inspired Recognition of Identity in Vehicular Networks P Memarmoshrefi, TR Hartke 2020 IEEE Globecom Workshops (GC Wkshps, 1-6, 2020 | | 2020 |
Securing mobile ad-hoc networks using an artificial immune system A Kellner, P Memarmoshrefi, D Hogrefe Proceedings of the 8th International Conference on Bioinspired Information …, 2014 | | 2014 |
A Bio-Inspired Autonomous Authentication Mechanism in Mobile Ad Hoc Networks P Memarmoshrefi Niedersächsische Staats-und Universitätsbibliothek Göttingen, 2012 | | 2012 |
Deception, Identity, and Security: The Game Theory of Sybil Attacks Classical mathematical game theory helps to evolve the emerging logic of identity in the cyber world. W Casey, A Kellner, P Memarmoshrefi, JA Morales, B Mishra | | |