| Project Title | Domain Name | IEEE Year | DOWNLOAD | 
		
			| A Mobile Platform for Wireless Charging and Data Collection in Sensor Networks | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Event based Recursive Distributed Filtering over Wireless Sensor Networks | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Optimal charging in wireless rechargeable sensor networks | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| An Optimization Scheme of Adaptive Dynamic Energy Consumption Based on Joint Network Channel Coding in Wireless Sensor Networks | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Has Time Come to Switch From Duty Cycled MAC Protocols to Wake Up Radio for Wireless Sensor Networks | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Duplicate Detectable Opportunistic Forwarding in Duty Cycled WirelessSensor Networks | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Performance management of IEEE 802 15 4 wireless sensor network for precision agriculture | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Ubiquitous Monitoring for Industrial Cyber Physical Systemsover Relay Assisted Wireless Sensor Networks | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Characterization of Wireless Channel Impact on Wireless Sensor NetworkPerformance in Public Transportation Buses | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| An Energy Efficient and Delay Aware Wireless Computing System for Industrial Wireless Sensor Networks | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Lifetime and Energy Hole Evolution Analysis in Data Gathering WirelessSensor Networks | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| A Mobile Platform for Wireless Charging and Data Collection in SensorNetworks | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Vproof Lightweight privacy preserving vehicle location proofs | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Vehicle Mobility and communication channel models for realistic and efficient highway VANET Simulation | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| On the spatiotemporal traffic variation in vehicle mobility modeling | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Multihop Delievery quality based routing in DTNs | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Maximum lifetime scheduling for target coverage and data collection in wireless sensor networks | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Geographic based spray and relay GSaR an efficient routing scheme for DTNs | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Experimental characterization and modeling of RF jamming attacks on VANETs | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| Energy efficient probabilistic area coverage in wireless sensor networks | Network Security | 2015 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| LATENCY EQUALIZATION AS A NEW NETWORK SERVICE PRIMITIVE | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| THROUGHPUT OPTIMAL SCHEDULING IN MULTIHOP WIRELESS NETWORKS WITHOUT PER FLOW INFORMATION | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| AN EFFICIENT AND ROBUST ADDRESSING PROTOCOL FOR NODE AUTOCONFIGURATION IN AD HOC NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| SCHEDULING MOBILE NODES FOR COOPERATIVE DATA TRANSPORT IN SENSOR NETWORKS  | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| EFFICIENT ALGORITHMS FOR NEIGHBOR DISCOVERY IN WIRELESS NETWORKS  | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| NETWORK RESOURCE ALLOCATION FOR USERS WITH MULTIPLE CONNECTIONS FAIRNESS AND STABILITY | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| QUANTIFYING AND VERIFYING REACHABILITY FOR ACCESS CONTROLLED NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| A LOW COMPLEXITY CONGESTION CONTROL AND SCHEDULING ALGORITHM FOR MULTIHOP WIRELESS NETWORKS WITH ORDER OPTIMAL PER FLOW DELAY | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| ICTCP INCAST CONGESTION CONTROL FOR TCP IN DATA CENTER NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| ON THE NODE CLONE DETECTION IN WIRELESS SENSOR NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| CENTRALIZED AND DISTRIBUTED PROTOCOLS FOR TRACKER BASED DYNAMIC SWARM MANAGEMENT | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| INCENTIVE COMPATIBLE PRIVACY PRESERVING DISTRIBUTED CLASSIFICATION | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| PACKET HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| LOCALIZED ALGORITHMS FOR DETECTION OF NODE REPLICATION ATTACKS IN MOBILE SENSOR NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| PHYSICAL LAYER SECURITY IN DISTRIBUTED WIRELESS NETWORKS USING MATCHING THEORY | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| ON ENERGY SECRECY TRADE OFFS FOR GAUSSIAN WIRETAP CHANNELS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| DETECTING COVERT CHANNELS IN COMPUTER NETWORKS BASED ON CHAOS THEORY | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| SECURING ONLINE REPUTATION SYSTEMS THROUGH TRUST MODELING AND TEMPORAL ANALYSIS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| INTERNET TRAFFIC CLASSIFICATION BY AGGREGATING CORRELATED NAIVE BAYES PREDICTIONS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| NON COOPERATIVE LOCATION PRIVACY | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| UNCOORDINATED COOPERATIVE JAMMING FOR SECRET COMMUNICATIONS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| COKE CRYPTO LESS OVER THE AIR KEY ESTABLISHMENT | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| SORT A SELF ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| MALWARE CLEARANCE FOR SECURE COMMITMENT OF OS LEVEL VIRTUAL MACHINES | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| TRPF A TRAJECTORY PRIVACY PRESERVING FRAMEWORK FOR PARTICIPATORY SENSING | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| WARNINGBIRD A NEAR REAL TIME DETECTION SYSTEM FOR SUSPICIOUS URLS IN TWITTER STREAM | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| TO LIE OR TO COMPLY DEFENDING AGAINST FLOOD ATTACKS IN DISRUPTION TOLERANT NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| VAMPIRE ATTACKS DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| INDEPENDENT DIRECTED ACYCLIC GRAPHS FOR RESILIENT MULTIPATH ROUTING | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| MULTICAST CAPACITY WITH MAX MIN FAIRNESS FOR HETEROGENEOUS NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| GENERALIZED EPIDEMIC MEAN FIELD MODEL FOR SPREADING PROCESSES OVER MULTILAYER COMPLEX NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| ACHIEVING EFFICIENT FLOODING BY UTILIZING LINK CORRELATION IN WIRELESS SENSOR NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| A UTILITY MAXIMIZATION FRAMEWORK FOR FAIR AND EFFICIENT MULTICASTING IN MULTICARRIER WIRELESS CELLULAR NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| RANDOM WALKS AND GREEN S FUNCTION ON DIGRAPHS A FRAMEWORK FOR ESTIMATING WIRELESS TRANSMISSION COSTS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| ABC ADAPTIVE BINARY CUTTINGS FOR MULTIDIMENSIONAL PACKET CLASSIFICATION | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| BACK PRESSURE BASED PACKET BY PACKET ADAPTIVE ROUTING IN COMMUNICATION NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| A UTILITY MAXIMIZATION FRAMEWORK FOR FAIR AND EFFICIENT MULTICASTING IN MULTICARRIER WIRELESS CELLULAR NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| COMPLEXITY ANALYSIS AND ALGORITHM DESIGN FOR ADVANCE BANDWIDTH SCHEDULING IN DEDICATED NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| ATTRIBUTE AWARE DATA AGGREGATION USING POTENTIAL BASED DYNAMIC ROUTING IN WIRELESS SENSOR NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| A NEW PROGRESSIVE ALGORITHM FOR A MULTIPLE LONGEST COMMON SUBSEQUENCES PROBLEM AND ITS EFFICIENT PARALLELIZATION | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| FAST TRANSMISSION TO REMOTE COOPERATIVE GROUPS A NEW KEY MANAGEMENT PARADIGM | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| EXPLORING THE DESIGN SPACE OF MULTICHANNEL PEER TO PEER LIVE VIDEO STREAMING SYSTEMS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| DIFFUSION DYNAMICS OF NETWORK TECHNOLOGIES WITH BOUNDED RATIONAL USERS ASPIRATION BASED LEARNING | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| A DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| A NEW METHOD FOR EEG BASED CONCEALED INFORMATION TEST | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTION | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| A NOVEL ELECTRONIC ENGLISH AUCTION SYSTEM WITH A SECURE ON SHELF MECHANISM | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| GENERAL CONSTRUCTIONS FOR THRESHOLD MULTIPLE SECRET VISUAL CRYPTOGRAPHIC SCHEMES | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| LOCATION AWARE AND SAFER CARDS ENHANCING RFID SECURITY AND PRIVACY VIA LOCATION SENSING | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| COST BASED OPTIMIZATION OF SERVICE COMPOSITIONS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| FINDING THE OPTIMAL SOCIAL TRUST PATH FOR THE SELECTION OF TRUSTWORTHY SERVICE PROVIDERS IN COMPLEX SOCIAL NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| A DECENTRALIZED SERVICE DISCOVERY APPROACH ON PEER TO PEER NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| QOS DRIVEN SERVICE COMPOSITION WITH RECONFIGURABLE SERVICES | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| LDTS A LIGHTWEIGHT AND DEPENDABLE TRUST SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| A SYSTEM FOR TIMELY AND CONTROLLED INFORMATION SHARING IN EMERGENCY SITUATIONS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| DESTINATION ASSISTED COOPERATIVE JAMMING FOR WIRELESS PHYSICAL LAYER SECURITY | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 | 
		
			| ON THE SECURITY OF END TO END MEASUREMENTS BASED ON PACKET PAIR DISPERSIONS | Network Security | 2013 | 
                                   
                                           Download
                                    
                                        
                                 |