LoRaWAN possible attacks, proposed countermeasures and enhanced solution. | 0 | 0.34 | 2021 |
TRAK-CPABE: A novel Traceable, Revocable and Accountable Ciphertext-Policy Attribute-Based Encryption scheme in cloud computing | 0 | 0.34 | 2021 |
Towards a Novel Vehicular Ad Hoc Networks Based on SDN | 0 | 0.34 | 2021 |
SMC - A New Strategy Based on Software-Defined Networking to Mitigate the Impact of Anomalies on Cooperative Cloud. | 0 | 0.34 | 2021 |
Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security | 1 | 0.36 | 2020 |
Fuzzified Double Game for Qos-Aware LTE-U and Wifi Coexistence in 5Ghz Band | 0 | 0.34 | 2020 |
Collaborative and verifiable key derivation protocol for smart home security: CV-KDP | 0 | 0.34 | 2020 |
Security issues in Industry 4.0 | 1 | 0.34 | 2020 |
Multi-user diversity wireless multicast: A Survey. | 0 | 0.34 | 2020 |
An Orthogonal Air Pollution Monitoring Method (OAPM) Based on LoRaWAN. | 0 | 0.34 | 2020 |
WiFi/LTE learning based Qos-aware Coexistence | 0 | 0.34 | 2020 |
Auction-based Time Resource Allocation for Energy Harvesting WBAN. | 0 | 0.34 | 2020 |
Collision-Free Transmissions in an IoT Monitoring Application Based on LoRaWAN. | 0 | 0.34 | 2020 |
Using Information Centric Networking in Internet of Things: A Survey | 3 | 0.46 | 2019 |
Revocable Sliced Ciphertext Policy Attribute Based Encryption Scheme In Cloud Computing | 0 | 0.34 | 2019 |
Adaptive Security For The Intra-Electric Vehicular Wireless Networks | 0 | 0.34 | 2019 |
Privacy-preserving aware data transmission for IoT-based e-health. | 1 | 0.35 | 2019 |
Canonical Coalition Game for Solving Wifi and LTE Coexistence Issues on the 5Ghz Band | 2 | 0.42 | 2019 |
Toward Ciphertext Policy Attribute Based Encryption Model - A Revocable Access Control Solution in Cloud Computing. | 0 | 0.34 | 2019 |
Power consumption comparison of synchronized IoT devices running FreeRTOS and RIOT | 0 | 0.34 | 2019 |
Maximizing Lifetime in Energy-Harvesting WBSN for Health Monitoring Systems Through Dynamic Slots Allocation | 0 | 0.34 | 2019 |
CAN-TM: Chain Augmented Naïve Bayes-based Trust Model for Reliable Cloud Service Selection | 0 | 0.34 | 2019 |
Cluster-based scheduling for cognitive radio sensor networks. | 0 | 0.34 | 2019 |
FCR-NS: a novel caching and forwarding strategy for Named Data Networking based on Software Defined Networking | 1 | 0.36 | 2019 |
A survey on Blockchain based access control for Internet of Things | 0 | 0.34 | 2019 |
PP-NDNoT: On preserving privacy in IoT-based E-health systems over NDN | 0 | 0.34 | 2019 |
Lightweight and Secure Password Based Smart Home Authentication Protocol: LSP-SHAP | 0 | 0.34 | 2019 |
Towards a novel cache replacement strategy for Named Data Networking based on Software Defined Networking. | 3 | 0.39 | 2018 |
Intelligent slots allocation for dynamic differentiation in IEEE 802.15.6 CSMA/CA. | 2 | 0.40 | 2018 |
Trust Management In Cognitive Radio Networks: A Survey | 0 | 0.34 | 2018 |
LoRaWAN Analysis Under Unsaturated Traffic, Orthogonal and Non-Orthogonal Spreading Factor Conditions | 1 | 0.35 | 2018 |
An automated sensor nodes' speed estimation for wireless sensor networks. | 0 | 0.34 | 2018 |
Hybrid Centralised Mac Protocol For Reliable Broadcast Of Safety Messages In Vehicular Ad Hoc Network | 0 | 0.34 | 2018 |
Improved Distributed Virtual Forces Algorithm For 3d Terrains Coverage In Mobile Wireless Sensor Networks | 0 | 0.34 | 2018 |
QCH-MAC: A Qos-Aware Centralized Hybrid MAC Protocol for Vehicular Ad Hoc NETworks | 0 | 0.34 | 2018 |
A Throughput-Oriented Reliable Multicast In Multi-Rate Wireless Networks | 0 | 0.34 | 2018 |
Toward privacy preserving in IoT e-health systems: A key escrow identity-based encryption scheme | 0 | 0.34 | 2018 |
Surveying and Analyzing Urban Environment Approaches of Air Quality Monitoring. | 0 | 0.34 | 2018 |
Hierarchical Fair Spectrum Sharing in CRSNs for Smart Grid Monitoring | 0 | 0.34 | 2018 |
End to End Cloud Computing Architecture Based on A Novel Classification of Security Issues | 0 | 0.34 | 2017 |
Improved Data Storage Confidentiality in Cloud Computing Using Identity-Based Cryptography | 0 | 0.34 | 2017 |
Centralized connectivity restoration in multichannel wireless sensor networks. | 2 | 0.36 | 2017 |
Using SDN Approach to Secure Cloud Servers against Flooding Based DDoS Attacks | 2 | 0.40 | 2017 |
Inter-flow and intra-flow interference mitigation routing in wireless mesh networks. | 2 | 0.36 | 2017 |
Towards A Novel Forwarding Strategy For Named Data Networking Based On Sdn And Bloom Filter | 1 | 0.34 | 2017 |
Feedback Entropy: A New Metric to Detect Unfair Rating Attacks for Trust Computing in Cloud Environments | 0 | 0.34 | 2017 |
LTE-U and WiFi coexistence in the 5 GHz unlicensed spectrum: A survey | 1 | 0.37 | 2017 |
Recovery from simultaneous failures in a large scale wireless sensor network. | 0 | 0.34 | 2017 |
Trusted Third Party Based Key Management For Enhancing Lorawan Security | 0 | 0.34 | 2017 |
Modeling correlation between QoS attributes for trust computation in cloud computing environments. | 1 | 0.34 | 2017 |