Robust Self-Protection Against Application-Layer (D)Dos Attacks In Sdn Environment | 0 | 0.34 | 2020 |
Energy-aware Collision Avoidance stochastic Optimizer for a UAVs set. | 0 | 0.34 | 2020 |
ZSM Security: Threat Surface and Best Practices | 3 | 0.44 | 2020 |
AI-Driven Zero Touch Network and Service Management in 5G and Beyond: Challenges and Research Directions | 13 | 0.78 | 2020 |
INSPIRE-5Gplus - intelligent security and pervasive trust for 5G and beyond networks. | 1 | 0.36 | 2020 |
GPS Spoofing Detector with Adaptive Trustable Residence Area for Cellular based-UAVs. | 0 | 0.34 | 2020 |
AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler? | 3 | 0.41 | 2020 |
Connectivity-aware Relay Node Deployment in Grid-based Wireless Sensor Networks | 0 | 0.34 | 2019 |
Energy and Delay Aware Physical Collision Avoidance in Unmanned Aerial Vehicles. | 0 | 0.34 | 2018 |
Energy-efficient coverage protocol based on stable and predictive scheduling in wireless sensor networks. | 2 | 0.37 | 2017 |
Efficient clock synchronization for clustered wireless sensor networks. | 3 | 0.37 | 2017 |
Efficient Offloading Mechanism For Uavs-Based Value Added Services | 1 | 0.35 | 2017 |
MS-WMSN: service-oriented planning tool for wireless multimedia monitoring services. | 0 | 0.34 | 2016 |
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities | 0 | 0.34 | 2016 |
CMTS: Consensus-based Multi-hop Time Synchronization protocol in wireless sensor networks | 0 | 0.34 | 2016 |
Intelligent detection of MAC spoofing attack in 802.11 network. | 1 | 0.35 | 2016 |
Fast authentication in wireless sensor networks | 5 | 0.44 | 2016 |
Virtualization and Cyber Security: Arming Future Security Practitioners | 0 | 0.34 | 2015 |
Sleep scheduling with predictive coverage redundancy check in wireless sensor networks | 2 | 0.37 | 2015 |
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation | 0 | 0.34 | 2015 |
A Low-Complex Coverage Eligibility Algorithm For Wireless Sensor Networks | 0 | 0.34 | 2015 |
Virtualization and Cyber Security: Arming Future Security Practitioners | 0 | 0.34 | 2015 |
ARP Cache Poisoning Mitigation and Forensics Investigation | 0 | 0.34 | 2015 |
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation | 0 | 0.34 | 2015 |
LSEA: Light Weight Sector Eligibility Algorithm for k-Coverage in Wireless Sensor Networks | 0 | 0.34 | 2015 |
ARP Cache Poisoning Mitigation and Forensics Investigation | 2 | 0.49 | 2015 |
An efficient clock synchronization protocol for wireless sensor networks | 3 | 0.45 | 2014 |
Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks | 2 | 0.39 | 2012 |
Fast verification of an ID-based signature scheme for broadcast authentication inwireless sensor networks | 0 | 0.34 | 2012 |
Secure pairwise broadcast time synchronization in wireless sensor networks. | 4 | 0.51 | 2011 |
A causal multicast protocol for dynamic groups in cellular networks | 2 | 0.37 | 2008 |
BMobi_Causal: a causal broadcast protocol in mobile dynamic groups | 1 | 0.36 | 2008 |
An Optimal Causal Broadcast Protocol in Mobile Dynamic Groups | 2 | 0.37 | 2008 |
Mobi_Causal: a protocol for causal message ordering in mobile computing systems | 4 | 0.47 | 2005 |