| Project Title | Domain Name | IEEE Year | DOWNLOAD |
| A Mobile Platform for Wireless Charging and Data Collection in Sensor Networks | Network Security | 2015 |
Download
|
| Event based Recursive Distributed Filtering over Wireless Sensor Networks | Network Security | 2015 |
Download
|
| Optimal charging in wireless rechargeable sensor networks | Network Security | 2015 |
Download
|
| An Optimization Scheme of Adaptive Dynamic Energy Consumption Based on Joint Network Channel Coding in Wireless Sensor Networks | Network Security | 2015 |
Download
|
| Has Time Come to Switch From Duty Cycled MAC Protocols to Wake Up Radio for Wireless Sensor Networks | Network Security | 2015 |
Download
|
| Duplicate Detectable Opportunistic Forwarding in Duty Cycled WirelessSensor Networks | Network Security | 2015 |
Download
|
| Performance management of IEEE 802 15 4 wireless sensor network for precision agriculture | Network Security | 2015 |
Download
|
| Ubiquitous Monitoring for Industrial Cyber Physical Systemsover Relay Assisted Wireless Sensor Networks | Network Security | 2015 |
Download
|
| Characterization of Wireless Channel Impact on Wireless Sensor NetworkPerformance in Public Transportation Buses | Network Security | 2015 |
Download
|
| An Energy Efficient and Delay Aware Wireless Computing System for Industrial Wireless Sensor Networks | Network Security | 2015 |
Download
|
| Lifetime and Energy Hole Evolution Analysis in Data Gathering WirelessSensor Networks | Network Security | 2015 |
Download
|
| A Mobile Platform for Wireless Charging and Data Collection in SensorNetworks | Network Security | 2015 |
Download
|
| Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack | Network Security | 2015 |
Download
|
| Vproof Lightweight privacy preserving vehicle location proofs | Network Security | 2015 |
Download
|
| Vehicle Mobility and communication channel models for realistic and efficient highway VANET Simulation | Network Security | 2015 |
Download
|
| On the spatiotemporal traffic variation in vehicle mobility modeling | Network Security | 2015 |
Download
|
| Multihop Delievery quality based routing in DTNs | Network Security | 2015 |
Download
|
| Maximum lifetime scheduling for target coverage and data collection in wireless sensor networks | Network Security | 2015 |
Download
|
| Geographic based spray and relay GSaR an efficient routing scheme for DTNs | Network Security | 2015 |
Download
|
| Experimental characterization and modeling of RF jamming attacks on VANETs | Network Security | 2015 |
Download
|
| Energy efficient probabilistic area coverage in wireless sensor networks | Network Security | 2015 |
Download
|
| LATENCY EQUALIZATION AS A NEW NETWORK SERVICE PRIMITIVE | Network Security | 2013 |
Download
|
| THROUGHPUT OPTIMAL SCHEDULING IN MULTIHOP WIRELESS NETWORKS WITHOUT PER FLOW INFORMATION | Network Security | 2013 |
Download
|
| AN EFFICIENT AND ROBUST ADDRESSING PROTOCOL FOR NODE AUTOCONFIGURATION IN AD HOC NETWORKS | Network Security | 2013 |
Download
|
| SCHEDULING MOBILE NODES FOR COOPERATIVE DATA TRANSPORT IN SENSOR NETWORKS | Network Security | 2013 |
Download
|
| EFFICIENT ALGORITHMS FOR NEIGHBOR DISCOVERY IN WIRELESS NETWORKS | Network Security | 2013 |
Download
|
| NETWORK RESOURCE ALLOCATION FOR USERS WITH MULTIPLE CONNECTIONS FAIRNESS AND STABILITY | Network Security | 2013 |
Download
|
| QUANTIFYING AND VERIFYING REACHABILITY FOR ACCESS CONTROLLED NETWORKS | Network Security | 2013 |
Download
|
| A LOW COMPLEXITY CONGESTION CONTROL AND SCHEDULING ALGORITHM FOR MULTIHOP WIRELESS NETWORKS WITH ORDER OPTIMAL PER FLOW DELAY | Network Security | 2013 |
Download
|
| ICTCP INCAST CONGESTION CONTROL FOR TCP IN DATA CENTER NETWORKS | Network Security | 2013 |
Download
|
| ON THE NODE CLONE DETECTION IN WIRELESS SENSOR NETWORKS | Network Security | 2013 |
Download
|
| CENTRALIZED AND DISTRIBUTED PROTOCOLS FOR TRACKER BASED DYNAMIC SWARM MANAGEMENT | Network Security | 2013 |
Download
|
| INCENTIVE COMPATIBLE PRIVACY PRESERVING DISTRIBUTED CLASSIFICATION | Network Security | 2013 |
Download
|
| PACKET HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS | Network Security | 2013 |
Download
|
| LOCALIZED ALGORITHMS FOR DETECTION OF NODE REPLICATION ATTACKS IN MOBILE SENSOR NETWORKS | Network Security | 2013 |
Download
|
| PHYSICAL LAYER SECURITY IN DISTRIBUTED WIRELESS NETWORKS USING MATCHING THEORY | Network Security | 2013 |
Download
|
| ON ENERGY SECRECY TRADE OFFS FOR GAUSSIAN WIRETAP CHANNELS | Network Security | 2013 |
Download
|
| DETECTING COVERT CHANNELS IN COMPUTER NETWORKS BASED ON CHAOS THEORY | Network Security | 2013 |
Download
|
| SECURING ONLINE REPUTATION SYSTEMS THROUGH TRUST MODELING AND TEMPORAL ANALYSIS | Network Security | 2013 |
Download
|
| INTERNET TRAFFIC CLASSIFICATION BY AGGREGATING CORRELATED NAIVE BAYES PREDICTIONS | Network Security | 2013 |
Download
|
| NON COOPERATIVE LOCATION PRIVACY | Network Security | 2013 |
Download
|
| UNCOORDINATED COOPERATIVE JAMMING FOR SECRET COMMUNICATIONS | Network Security | 2013 |
Download
|
| COKE CRYPTO LESS OVER THE AIR KEY ESTABLISHMENT | Network Security | 2013 |
Download
|
| SORT A SELF ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS | Network Security | 2013 |
Download
|
| MALWARE CLEARANCE FOR SECURE COMMITMENT OF OS LEVEL VIRTUAL MACHINES | Network Security | 2013 |
Download
|
| TRPF A TRAJECTORY PRIVACY PRESERVING FRAMEWORK FOR PARTICIPATORY SENSING | Network Security | 2013 |
Download
|
| WARNINGBIRD A NEAR REAL TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER STREAM | Network Security | 2013 |
Download
|
| TO LIE OR TO COMPLY DEFENDING AGAINST FLOOD ATTACKS IN DISRUPTION TOLERANT NETWORKS | Network Security | 2013 |
Download
|
| VAMPIRE ATTACKS DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS | Network Security | 2013 |
Download
|
| INDEPENDENT DIRECTED ACYCLIC GRAPHS FOR RESILIENT MULTIPATH ROUTING | Network Security | 2013 |
Download
|
| MULTICAST CAPACITY WITH MAX MIN FAIRNESS FOR HETEROGENEOUS NETWORKS | Network Security | 2013 |
Download
|
| GENERALIZED EPIDEMIC MEAN FIELD MODEL FOR SPREADING PROCESSES OVER MULTILAYER COMPLEX NETWORKS | Network Security | 2013 |
Download
|
| ACHIEVING EFFICIENT FLOODING BY UTILIZING LINK CORRELATION IN WIRELESS SENSOR NETWORKS | Network Security | 2013 |
Download
|
| A UTILITY MAXIMIZATION FRAMEWORK FOR FAIR AND EFFICIENT MULTICASTING IN MULTICARRIER WIRELESS CELLULAR NETWORKS | Network Security | 2013 |
Download
|
| RANDOM WALKS AND GREEN S FUNCTION ON DIGRAPHS A FRAMEWORK FOR ESTIMATING WIRELESS TRANSMISSION COSTS | Network Security | 2013 |
Download
|
| ABC ADAPTIVE BINARY CUTTINGS FOR MULTIDIMENSIONAL PACKET CLASSIFICATION | Network Security | 2013 |
Download
|
| BACK PRESSURE BASED PACKET BY PACKET ADAPTIVE ROUTING IN COMMUNICATION NETWORKS | Network Security | 2013 |
Download
|
| A UTILITY MAXIMIZATION FRAMEWORK FOR FAIR AND EFFICIENT MULTICASTING IN MULTICARRIER WIRELESS CELLULAR NETWORKS | Network Security | 2013 |
Download
|
| COMPLEXITY ANALYSIS AND ALGORITHM DESIGN FOR ADVANCE BANDWIDTH SCHEDULING IN DEDICATED NETWORKS | Network Security | 2013 |
Download
|
| ATTRIBUTE AWARE DATA AGGREGATION USING POTENTIAL BASED DYNAMIC ROUTING IN WIRELESS SENSOR NETWORKS | Network Security | 2013 |
Download
|
| A NEW PROGRESSIVE ALGORITHM FOR A MULTIPLE LONGEST COMMON SUBSEQUENCES PROBLEM AND ITS EFFICIENT PARALLELIZATION | Network Security | 2013 |
Download
|
| FAST TRANSMISSION TO REMOTE COOPERATIVE GROUPS A NEW KEY MANAGEMENT PARADIGM | Network Security | 2013 |
Download
|
| EXPLORING THE DESIGN SPACE OF MULTICHANNEL PEER TO PEER LIVE VIDEO STREAMING SYSTEMS | Network Security | 2013 |
Download
|
| DIFFUSION DYNAMICS OF NETWORK TECHNOLOGIES WITH BOUNDED RATIONAL USERS ASPIRATION BASED LEARNING | Network Security | 2013 |
Download
|
| A DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS | Network Security | 2013 |
Download
|
| A NEW METHOD FOR EEG BASED CONCEALED INFORMATION TEST | Network Security | 2013 |
Download
|
| REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTION | Network Security | 2013 |
Download
|
| A NOVEL ELECTRONIC ENGLISH AUCTION SYSTEM WITH A SECURE ON SHELF MECHANISM | Network Security | 2013 |
Download
|
| GENERAL CONSTRUCTIONS FOR THRESHOLD MULTIPLE SECRET VISUAL CRYPTOGRAPHIC SCHEMES | Network Security | 2013 |
Download
|
| LOCATION AWARE AND SAFER CARDS ENHANCING RFID SECURITY AND PRIVACY VIA LOCATION SENSING | Network Security | 2013 |
Download
|
| COST BASED OPTIMIZATION OF SERVICE COMPOSITIONS | Network Security | 2013 |
Download
|
| FINDING THE OPTIMAL SOCIAL TRUST PATH FOR THE SELECTION OF TRUSTWORTHY SERVICE PROVIDERS IN COMPLEX SOCIAL NETWORKS | Network Security | 2013 |
Download
|
| A DECENTRALIZED SERVICE DISCOVERY APPROACH ON PEER TO PEER NETWORKS | Network Security | 2013 |
Download
|
| QOS DRIVEN SERVICE COMPOSITION WITH RECONFIGURABLE SERVICES | Network Security | 2013 |
Download
|
| LDTS A LIGHTWEIGHT AND DEPENDABLE TRUST SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKS | Network Security | 2013 |
Download
|
| A SYSTEM FOR TIMELY AND CONTROLLED INFORMATION SHARING IN EMERGENCY SITUATIONS | Network Security | 2013 |
Download
|
| DESTINATION ASSISTED COOPERATIVE JAMMING FOR WIRELESS PHYSICAL LAYER SECURITY | Network Security | 2013 |
Download
|
| ON THE SECURITY OF END TO END MEASUREMENTS BASED ON PACKET PAIR DISPERSIONS | Network Security | 2013 |
Download
|