A proportional, integral and derivative differential evolution algorithm for global optimization | 0 | 0.34 | 2022 |
Poster - A Neural Network based Cluster Ensemble Approach for Anomaly Detection in DynamicWeighted Graphs. | 0 | 0.34 | 2021 |
SEC 2 : A Secure and Energy Efficient Barrier Coverage Scheduling for WSN-Based IoT Applications | 1 | 0.34 | 2021 |
A Graph-Based Fault-Tolerant Approach to Modeling QoS for IoT-Based Surveillance Applications | 1 | 0.35 | 2021 |
Resource Allocation for D2D-Based V2X Communication With Imperfect CSI. | 3 | 0.37 | 2020 |
A Secure Barrier Coverage Scheduling Framework for WSN-based IoT Applications | 0 | 0.34 | 2020 |
Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations. | 0 | 0.34 | 2019 |
Finger-to-Heart(F2H): Authentication for Wireless Implantable Medical Devices. | 3 | 0.37 | 2019 |
Joint Power Control and Resource Allocation Mode Selection for Safety-Related V2X Communication | 3 | 0.38 | 2019 |
Joint Distributed and Centralized Resource Scheduling for D2D-Based V2X Communication. | 0 | 0.34 | 2018 |
A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems. | 0 | 0.34 | 2018 |
Joint Autonomous Resource Selection And Scheduled Resource Allocation For D2d-Based V2x Communication | 0 | 0.34 | 2018 |
Resource Allocation for Underlay D2D Communication With Proportional Fairness. | 3 | 0.40 | 2018 |
Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks. | 21 | 0.85 | 2017 |
From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices | 0 | 0.34 | 2017 |
Joint mode selection and proportional fair scheduling for D2D communication | 0 | 0.34 | 2017 |
Classifying high dimensional data by interactive visual analysis | 1 | 0.35 | 2016 |
Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform | 0 | 0.34 | 2016 |
Special issue on trust and security in wireless sensor networks | 0 | 0.34 | 2015 |
An Improved Binary Sequence Generation for Securing Wireless Body Area Networks. | 1 | 0.36 | 2015 |
Securing wireless medical implants using an ECG-based secret data sharing scheme | 4 | 0.46 | 2014 |
An ECG-based Secret Data Sharing scheme supporting emergency treatment of Implantable Medical Devices | 4 | 0.42 | 2014 |
Interactive Visual Classification of Multivariate Data | 1 | 0.36 | 2012 |
A visual approach for classification based on data projection | 1 | 0.38 | 2012 |
A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks | 7 | 0.51 | 2010 |
A trust management architecture for hierarchical wireless sensor networks | 15 | 0.69 | 2010 |
A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks. | 6 | 0.47 | 2010 |
Securing Session Initiation Protocol in Voice over IP Domain | 0 | 0.34 | 2009 |
Critical issues in trust management for mobile ad-hoc networks | 1 | 0.36 | 2009 |
Securing The Ad-Hoc On-Demand Distance Vector Protocol | 0 | 0.34 | 2004 |
Security for cluster based ad hoc networks | 24 | 1.31 | 2004 |
Secure Multicast Support for Mobile IP with Hierarchical Registration Approach | 0 | 0.34 | 2002 |
A distributed location management scheme for mobile hosts | 5 | 0.57 | 2001 |
Integrating Network Services for Virtual Teams | 1 | 0.37 | 2001 |
Secure Multicast Extensions for Mobile Networks | 2 | 0.43 | 1999 |
Security services and public key infrastructure for ATM networks | 2 | 0.44 | 1997 |
Security Issues in Asynchronous Transfer Mode | 3 | 0.56 | 1997 |