Project Title | Domain Name | IEEE Year | DOWNLOAD |
A Mobile Platform for Wireless Charging and Data Collection in Sensor Networks | Network Security | 2015 |
Download
|
Event based Recursive Distributed Filtering over Wireless Sensor Networks | Network Security | 2015 |
Download
|
Optimal charging in wireless rechargeable sensor networks | Network Security | 2015 |
Download
|
An Optimization Scheme of Adaptive Dynamic Energy Consumption Based on Joint Network Channel Coding in Wireless Sensor Networks | Network Security | 2015 |
Download
|
Has Time Come to Switch From Duty Cycled MAC Protocols to Wake Up Radio for Wireless Sensor Networks | Network Security | 2015 |
Download
|
Duplicate Detectable Opportunistic Forwarding in Duty Cycled WirelessSensor Networks | Network Security | 2015 |
Download
|
Performance management of IEEE 802 15 4 wireless sensor network for precision agriculture | Network Security | 2015 |
Download
|
Ubiquitous Monitoring for Industrial Cyber Physical Systemsover Relay Assisted Wireless Sensor Networks | Network Security | 2015 |
Download
|
Characterization of Wireless Channel Impact on Wireless Sensor NetworkPerformance in Public Transportation Buses | Network Security | 2015 |
Download
|
An Energy Efficient and Delay Aware Wireless Computing System for Industrial Wireless Sensor Networks | Network Security | 2015 |
Download
|
Lifetime and Energy Hole Evolution Analysis in Data Gathering WirelessSensor Networks | Network Security | 2015 |
Download
|
A Mobile Platform for Wireless Charging and Data Collection in SensorNetworks | Network Security | 2015 |
Download
|
Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack | Network Security | 2015 |
Download
|
Vproof Lightweight privacy preserving vehicle location proofs | Network Security | 2015 |
Download
|
Vehicle Mobility and communication channel models for realistic and efficient highway VANET Simulation | Network Security | 2015 |
Download
|
On the spatiotemporal traffic variation in vehicle mobility modeling | Network Security | 2015 |
Download
|
Multihop Delievery quality based routing in DTNs | Network Security | 2015 |
Download
|
Maximum lifetime scheduling for target coverage and data collection in wireless sensor networks | Network Security | 2015 |
Download
|
Geographic based spray and relay GSaR an efficient routing scheme for DTNs | Network Security | 2015 |
Download
|
Experimental characterization and modeling of RF jamming attacks on VANETs | Network Security | 2015 |
Download
|
Energy efficient probabilistic area coverage in wireless sensor networks | Network Security | 2015 |
Download
|
LATENCY EQUALIZATION AS A NEW NETWORK SERVICE PRIMITIVE | Network Security | 2013 |
Download
|
THROUGHPUT OPTIMAL SCHEDULING IN MULTIHOP WIRELESS NETWORKS WITHOUT PER FLOW INFORMATION | Network Security | 2013 |
Download
|
AN EFFICIENT AND ROBUST ADDRESSING PROTOCOL FOR NODE AUTOCONFIGURATION IN AD HOC NETWORKS | Network Security | 2013 |
Download
|
SCHEDULING MOBILE NODES FOR COOPERATIVE DATA TRANSPORT IN SENSOR NETWORKS | Network Security | 2013 |
Download
|
EFFICIENT ALGORITHMS FOR NEIGHBOR DISCOVERY IN WIRELESS NETWORKS | Network Security | 2013 |
Download
|
NETWORK RESOURCE ALLOCATION FOR USERS WITH MULTIPLE CONNECTIONS FAIRNESS AND STABILITY | Network Security | 2013 |
Download
|
QUANTIFYING AND VERIFYING REACHABILITY FOR ACCESS CONTROLLED NETWORKS | Network Security | 2013 |
Download
|
A LOW COMPLEXITY CONGESTION CONTROL AND SCHEDULING ALGORITHM FOR MULTIHOP WIRELESS NETWORKS WITH ORDER OPTIMAL PER FLOW DELAY | Network Security | 2013 |
Download
|
ICTCP INCAST CONGESTION CONTROL FOR TCP IN DATA CENTER NETWORKS | Network Security | 2013 |
Download
|
ON THE NODE CLONE DETECTION IN WIRELESS SENSOR NETWORKS | Network Security | 2013 |
Download
|
CENTRALIZED AND DISTRIBUTED PROTOCOLS FOR TRACKER BASED DYNAMIC SWARM MANAGEMENT | Network Security | 2013 |
Download
|
INCENTIVE COMPATIBLE PRIVACY PRESERVING DISTRIBUTED CLASSIFICATION | Network Security | 2013 |
Download
|
PACKET HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS | Network Security | 2013 |
Download
|
LOCALIZED ALGORITHMS FOR DETECTION OF NODE REPLICATION ATTACKS IN MOBILE SENSOR NETWORKS | Network Security | 2013 |
Download
|
PHYSICAL LAYER SECURITY IN DISTRIBUTED WIRELESS NETWORKS USING MATCHING THEORY | Network Security | 2013 |
Download
|
ON ENERGY SECRECY TRADE OFFS FOR GAUSSIAN WIRETAP CHANNELS | Network Security | 2013 |
Download
|
DETECTING COVERT CHANNELS IN COMPUTER NETWORKS BASED ON CHAOS THEORY | Network Security | 2013 |
Download
|
SECURING ONLINE REPUTATION SYSTEMS THROUGH TRUST MODELING AND TEMPORAL ANALYSIS | Network Security | 2013 |
Download
|
INTERNET TRAFFIC CLASSIFICATION BY AGGREGATING CORRELATED NAIVE BAYES PREDICTIONS | Network Security | 2013 |
Download
|
NON COOPERATIVE LOCATION PRIVACY | Network Security | 2013 |
Download
|
UNCOORDINATED COOPERATIVE JAMMING FOR SECRET COMMUNICATIONS | Network Security | 2013 |
Download
|
COKE CRYPTO LESS OVER THE AIR KEY ESTABLISHMENT | Network Security | 2013 |
Download
|
SORT A SELF ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS | Network Security | 2013 |
Download
|
MALWARE CLEARANCE FOR SECURE COMMITMENT OF OS LEVEL VIRTUAL MACHINES | Network Security | 2013 |
Download
|
TRPF A TRAJECTORY PRIVACY PRESERVING FRAMEWORK FOR PARTICIPATORY SENSING | Network Security | 2013 |
Download
|
WARNINGBIRD A NEAR REAL TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER STREAM | Network Security | 2013 |
Download
|
TO LIE OR TO COMPLY DEFENDING AGAINST FLOOD ATTACKS IN DISRUPTION TOLERANT NETWORKS | Network Security | 2013 |
Download
|
VAMPIRE ATTACKS DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS | Network Security | 2013 |
Download
|
INDEPENDENT DIRECTED ACYCLIC GRAPHS FOR RESILIENT MULTIPATH ROUTING | Network Security | 2013 |
Download
|
MULTICAST CAPACITY WITH MAX MIN FAIRNESS FOR HETEROGENEOUS NETWORKS | Network Security | 2013 |
Download
|
GENERALIZED EPIDEMIC MEAN FIELD MODEL FOR SPREADING PROCESSES OVER MULTILAYER COMPLEX NETWORKS | Network Security | 2013 |
Download
|
ACHIEVING EFFICIENT FLOODING BY UTILIZING LINK CORRELATION IN WIRELESS SENSOR NETWORKS | Network Security | 2013 |
Download
|
A UTILITY MAXIMIZATION FRAMEWORK FOR FAIR AND EFFICIENT MULTICASTING IN MULTICARRIER WIRELESS CELLULAR NETWORKS | Network Security | 2013 |
Download
|
RANDOM WALKS AND GREEN S FUNCTION ON DIGRAPHS A FRAMEWORK FOR ESTIMATING WIRELESS TRANSMISSION COSTS | Network Security | 2013 |
Download
|
ABC ADAPTIVE BINARY CUTTINGS FOR MULTIDIMENSIONAL PACKET CLASSIFICATION | Network Security | 2013 |
Download
|
BACK PRESSURE BASED PACKET BY PACKET ADAPTIVE ROUTING IN COMMUNICATION NETWORKS | Network Security | 2013 |
Download
|
A UTILITY MAXIMIZATION FRAMEWORK FOR FAIR AND EFFICIENT MULTICASTING IN MULTICARRIER WIRELESS CELLULAR NETWORKS | Network Security | 2013 |
Download
|
COMPLEXITY ANALYSIS AND ALGORITHM DESIGN FOR ADVANCE BANDWIDTH SCHEDULING IN DEDICATED NETWORKS | Network Security | 2013 |
Download
|
ATTRIBUTE AWARE DATA AGGREGATION USING POTENTIAL BASED DYNAMIC ROUTING IN WIRELESS SENSOR NETWORKS | Network Security | 2013 |
Download
|
A NEW PROGRESSIVE ALGORITHM FOR A MULTIPLE LONGEST COMMON SUBSEQUENCES PROBLEM AND ITS EFFICIENT PARALLELIZATION | Network Security | 2013 |
Download
|
FAST TRANSMISSION TO REMOTE COOPERATIVE GROUPS A NEW KEY MANAGEMENT PARADIGM | Network Security | 2013 |
Download
|
EXPLORING THE DESIGN SPACE OF MULTICHANNEL PEER TO PEER LIVE VIDEO STREAMING SYSTEMS | Network Security | 2013 |
Download
|
DIFFUSION DYNAMICS OF NETWORK TECHNOLOGIES WITH BOUNDED RATIONAL USERS ASPIRATION BASED LEARNING | Network Security | 2013 |
Download
|
A DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS | Network Security | 2013 |
Download
|
A NEW METHOD FOR EEG BASED CONCEALED INFORMATION TEST | Network Security | 2013 |
Download
|
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTION | Network Security | 2013 |
Download
|
A NOVEL ELECTRONIC ENGLISH AUCTION SYSTEM WITH A SECURE ON SHELF MECHANISM | Network Security | 2013 |
Download
|
GENERAL CONSTRUCTIONS FOR THRESHOLD MULTIPLE SECRET VISUAL CRYPTOGRAPHIC SCHEMES | Network Security | 2013 |
Download
|
LOCATION AWARE AND SAFER CARDS ENHANCING RFID SECURITY AND PRIVACY VIA LOCATION SENSING | Network Security | 2013 |
Download
|
COST BASED OPTIMIZATION OF SERVICE COMPOSITIONS | Network Security | 2013 |
Download
|
FINDING THE OPTIMAL SOCIAL TRUST PATH FOR THE SELECTION OF TRUSTWORTHY SERVICE PROVIDERS IN COMPLEX SOCIAL NETWORKS | Network Security | 2013 |
Download
|
A DECENTRALIZED SERVICE DISCOVERY APPROACH ON PEER TO PEER NETWORKS | Network Security | 2013 |
Download
|
QOS DRIVEN SERVICE COMPOSITION WITH RECONFIGURABLE SERVICES | Network Security | 2013 |
Download
|
LDTS A LIGHTWEIGHT AND DEPENDABLE TRUST SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKS | Network Security | 2013 |
Download
|
A SYSTEM FOR TIMELY AND CONTROLLED INFORMATION SHARING IN EMERGENCY SITUATIONS | Network Security | 2013 |
Download
|
DESTINATION ASSISTED COOPERATIVE JAMMING FOR WIRELESS PHYSICAL LAYER SECURITY | Network Security | 2013 |
Download
|
ON THE SECURITY OF END TO END MEASUREMENTS BASED ON PACKET PAIR DISPERSIONS | Network Security | 2013 |
Download
|