| Project Title | Domain Name | IEEE Year | DOWNLOAD |
| LATENCY EQUALIZATION AS A NEW NETWORK SERVICE PRIMITIVE | Network Security | 2013 |
Download
|
| THROUGHPUT OPTIMAL SCHEDULING IN MULTIHOP WIRELESS NETWORKS WITHOUT PER FLOW INFORMATION | Network Security | 2013 |
Download
|
| AN EFFICIENT AND ROBUST ADDRESSING PROTOCOL FOR NODE AUTOCONFIGURATION IN AD HOC NETWORKS | Network Security | 2013 |
Download
|
| SCHEDULING MOBILE NODES FOR COOPERATIVE DATA TRANSPORT IN SENSOR NETWORKS | Network Security | 2013 |
Download
|
| EFFICIENT ALGORITHMS FOR NEIGHBOR DISCOVERY IN WIRELESS NETWORKS | Network Security | 2013 |
Download
|
| NETWORK RESOURCE ALLOCATION FOR USERS WITH MULTIPLE CONNECTIONS FAIRNESS AND STABILITY | Network Security | 2013 |
Download
|
| QUANTIFYING AND VERIFYING REACHABILITY FOR ACCESS CONTROLLED NETWORKS | Network Security | 2013 |
Download
|
| A LOW COMPLEXITY CONGESTION CONTROL AND SCHEDULING ALGORITHM FOR MULTIHOP WIRELESS NETWORKS WITH ORDER OPTIMAL PER FLOW DELAY | Network Security | 2013 |
Download
|
| ICTCP INCAST CONGESTION CONTROL FOR TCP IN DATA CENTER NETWORKS | Network Security | 2013 |
Download
|
| ON THE NODE CLONE DETECTION IN WIRELESS SENSOR NETWORKS | Network Security | 2013 |
Download
|
| CENTRALIZED AND DISTRIBUTED PROTOCOLS FOR TRACKER BASED DYNAMIC SWARM MANAGEMENT | Network Security | 2013 |
Download
|
| INCENTIVE COMPATIBLE PRIVACY PRESERVING DISTRIBUTED CLASSIFICATION | Network Security | 2013 |
Download
|
| PACKET HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS | Network Security | 2013 |
Download
|
| LOCALIZED ALGORITHMS FOR DETECTION OF NODE REPLICATION ATTACKS IN MOBILE SENSOR NETWORKS | Network Security | 2013 |
Download
|
| PHYSICAL LAYER SECURITY IN DISTRIBUTED WIRELESS NETWORKS USING MATCHING THEORY | Network Security | 2013 |
Download
|
| ON ENERGY SECRECY TRADE OFFS FOR GAUSSIAN WIRETAP CHANNELS | Network Security | 2013 |
Download
|
| DETECTING COVERT CHANNELS IN COMPUTER NETWORKS BASED ON CHAOS THEORY | Network Security | 2013 |
Download
|
| SECURING ONLINE REPUTATION SYSTEMS THROUGH TRUST MODELING AND TEMPORAL ANALYSIS | Network Security | 2013 |
Download
|
| INTERNET TRAFFIC CLASSIFICATION BY AGGREGATING CORRELATED NAIVE BAYES PREDICTIONS | Network Security | 2013 |
Download
|
| NON COOPERATIVE LOCATION PRIVACY | Network Security | 2013 |
Download
|
| UNCOORDINATED COOPERATIVE JAMMING FOR SECRET COMMUNICATIONS | Network Security | 2013 |
Download
|
| COKE CRYPTO LESS OVER THE AIR KEY ESTABLISHMENT | Network Security | 2013 |
Download
|
| SORT A SELF ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS | Network Security | 2013 |
Download
|
| MALWARE CLEARANCE FOR SECURE COMMITMENT OF OS LEVEL VIRTUAL MACHINES | Network Security | 2013 |
Download
|
| TRPF A TRAJECTORY PRIVACY PRESERVING FRAMEWORK FOR PARTICIPATORY SENSING | Network Security | 2013 |
Download
|
| WARNINGBIRD A NEAR REAL TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER STREAM | Network Security | 2013 |
Download
|
| TO LIE OR TO COMPLY DEFENDING AGAINST FLOOD ATTACKS IN DISRUPTION TOLERANT NETWORKS | Network Security | 2013 |
Download
|
| VAMPIRE ATTACKS DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS | Network Security | 2013 |
Download
|
| INDEPENDENT DIRECTED ACYCLIC GRAPHS FOR RESILIENT MULTIPATH ROUTING | Network Security | 2013 |
Download
|
| MULTICAST CAPACITY WITH MAX MIN FAIRNESS FOR HETEROGENEOUS NETWORKS | Network Security | 2013 |
Download
|
| GENERALIZED EPIDEMIC MEAN FIELD MODEL FOR SPREADING PROCESSES OVER MULTILAYER COMPLEX NETWORKS | Network Security | 2013 |
Download
|
| ACHIEVING EFFICIENT FLOODING BY UTILIZING LINK CORRELATION IN WIRELESS SENSOR NETWORKS | Network Security | 2013 |
Download
|
| A UTILITY MAXIMIZATION FRAMEWORK FOR FAIR AND EFFICIENT MULTICASTING IN MULTICARRIER WIRELESS CELLULAR NETWORKS | Network Security | 2013 |
Download
|
| RANDOM WALKS AND GREEN S FUNCTION ON DIGRAPHS A FRAMEWORK FOR ESTIMATING WIRELESS TRANSMISSION COSTS | Network Security | 2013 |
Download
|
| ABC ADAPTIVE BINARY CUTTINGS FOR MULTIDIMENSIONAL PACKET CLASSIFICATION | Network Security | 2013 |
Download
|
| BACK PRESSURE BASED PACKET BY PACKET ADAPTIVE ROUTING IN COMMUNICATION NETWORKS | Network Security | 2013 |
Download
|
| A UTILITY MAXIMIZATION FRAMEWORK FOR FAIR AND EFFICIENT MULTICASTING IN MULTICARRIER WIRELESS CELLULAR NETWORKS | Network Security | 2013 |
Download
|
| COMPLEXITY ANALYSIS AND ALGORITHM DESIGN FOR ADVANCE BANDWIDTH SCHEDULING IN DEDICATED NETWORKS | Network Security | 2013 |
Download
|
| | Network Security | 2013 |
Download
|
| ATTRIBUTE AWARE DATA AGGREGATION USING POTENTIAL BASED DYNAMIC ROUTING IN WIRELESS SENSOR NETWORKS | Network Security | 2013 |
Download
|
| | Network Security | 2013 |
Download
|
| A NEW PROGRESSIVE ALGORITHM FOR A MULTIPLE LONGEST COMMON SUBSEQUENCES PROBLEM AND ITS EFFICIENT PARALLELIZATION | Network Security | 2013 |
Download
|
| FAST TRANSMISSION TO REMOTE COOPERATIVE GROUPS A NEW KEY MANAGEMENT PARADIGM | Network Security | 2013 |
Download
|
| EXPLORING THE DESIGN SPACE OF MULTICHANNEL PEER TO PEER LIVE VIDEO STREAMING SYSTEMS | Network Security | 2013 |
Download
|
| DIFFUSION DYNAMICS OF NETWORK TECHNOLOGIES WITH BOUNDED RATIONAL USERS ASPIRATION BASED LEARNING | Network Security | 2013 |
Download
|
| A DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS | Network Security | 2013 |
Download
|
| A NEW METHOD FOR EEG BASED CONCEALED INFORMATION TEST | Network Security | 2013 |
Download
|
| REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTION | Network Security | 2013 |
Download
|
| A NOVEL ELECTRONIC ENGLISH AUCTION SYSTEM WITH A SECURE ON SHELF MECHANISM | Network Security | 2013 |
Download
|
| GENERAL CONSTRUCTIONS FOR THRESHOLD MULTIPLE SECRET VISUAL CRYPTOGRAPHIC SCHEMES | Network Security | 2013 |
Download
|
| LOCATION AWARE AND SAFER CARDS ENHANCING RFID SECURITY AND PRIVACY VIA LOCATION SENSING | Network Security | 2013 |
Download
|
| COST BASED OPTIMIZATION OF SERVICE COMPOSITIONS | Network Security | 2013 |
Download
|
| FINDING THE OPTIMAL SOCIAL TRUST PATH FOR THE SELECTION OF TRUSTWORTHY SERVICE PROVIDERS IN COMPLEX SOCIAL NETWORKS | Network Security | 2013 |
Download
|
| A DECENTRALIZED SERVICE DISCOVERY APPROACH ON PEER TO PEER NETWORKS | Network Security | 2013 |
Download
|
| QOS DRIVEN SERVICE COMPOSITION WITH RECONFIGURABLE SERVICES | Network Security | 2013 |
Download
|
| LDTS A LIGHTWEIGHT AND DEPENDABLE TRUST SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKS | Network Security | 2013 |
Download
|
| A SYSTEM FOR TIMELY AND CONTROLLED INFORMATION SHARING IN EMERGENCY SITUATIONS | Network Security | 2013 |
Download
|
| DESTINATION ASSISTED COOPERATIVE JAMMING FOR WIRELESS PHYSICAL LAYER SECURITY | Network Security | 2013 |
Download
|
| ON THE SECURITY OF END TO END MEASUREMENTS BASED ON PACKET PAIR DISPERSIONS | Network Security | 2013 |
Download
|