Learning From Network Data Changes for Unsupervised Botnet Detection | 0 | 0.34 | 2022 |
Performance Management on Multiple Communication Paths for Portable Assisted Living | 0 | 0.34 | 2021 |
Opportunistic Attribute Caching: Improving the Efficiency of ABAC in Fog-Based IoT Networks | 0 | 0.34 | 2021 |
Data-Driven C-RAN Optimization Exploiting Traffic and Mobility Dynamics of Mobile Users | 1 | 0.35 | 2021 |
A Defense Mechanism For Timing-Based Side-Channel Attacks On Iot Traffic | 0 | 0.34 | 2020 |
Social-based Cooperation of Vehicles for Data Dissemination of Critical Urban Events | 0 | 0.34 | 2020 |
Double Authentication Model based on PPG and ECG Signals. | 0 | 0.34 | 2020 |
GROWN: Local Data Compression in Real-Time To Support Energy Efficiency in WBAN | 0 | 0.34 | 2020 |
Traffic Model Based on Autoregression for PPG Signals in Wearable Networks | 1 | 0.37 | 2020 |
Detecting FDI Attack on Dense IoT Network with Distributed Filtering Collaboration and Consensus | 0 | 0.34 | 2020 |
Secure On-skin Biometric Signal Transmission using Galvanic Coupling | 0 | 0.34 | 2019 |
Context-aware network selection in heterogeneous wireless networks. | 1 | 0.35 | 2019 |
Clustering and reliability-driven mitigation of routing attacks in massive IoT systems | 1 | 0.36 | 2019 |
A Method for Identifying eHealth Applications Using Side-Channel Information. | 0 | 0.34 | 2019 |
Cryptographic Algorithms in Wearable Communications: An Empirical Analysis. | 0 | 0.34 | 2019 |
DEA - Anomaly Detection in Smart Environments using Artificial Intelligence. | 0 | 0.34 | 2019 |
A Continuous User Authentication System Based on Galvanic Coupling Communication for s-Health | 1 | 0.35 | 2019 |
MPTCP robustness against large-scale man-in-the-middle attacks. | 0 | 0.34 | 2019 |
A Self-Adaptable System for DDoS Attack Prediction Based on the Metastability Theory. | 0 | 0.34 | 2018 |
Microgrid Data Aggregation and Wireless Transfer Scheduling in the Presence of Time Sensitive Events. | 1 | 0.40 | 2018 |
The computer for the 21st century: present security & privacy challenges. | 1 | 0.38 | 2018 |
SPARTA: A survival performance degradation framework for identity federations. | 0 | 0.34 | 2017 |
Mapping critical illness early signs to priority alert transmission on wireless networks | 1 | 0.37 | 2017 |
Can MPTCP secure Internet communications from man-in-the-middle attacks? | 1 | 0.35 | 2017 |
CD-ASM: A new queuing paradigm to overcome bufferbloat effects in HetNets | 0 | 0.34 | 2017 |
A Survival Performance degrAdation fRamework for lArge-scale neTworked systems. | 0 | 0.34 | 2017 |
Corrigendum to "A framework for resilient and secure spectrum sensing on cognitive radio networks" [Computer Networks volume 79 (2015) 313-322]. | 0 | 0.34 | 2017 |
A Stochastic Adaptive Model to Explore Mobile Botnet Dynamics | 0 | 0.34 | 2017 |
Self-Organized SDN Controller Cluster Conformations against DDoS Attacks Effects. | 0 | 0.34 | 2016 |
Offloading Cellular Networks Through V2v Communications - How To Select The Seed-Vehicles? | 2 | 0.37 | 2016 |
Avoiding Collisions by Time Slot Reduction Supporting Voice and Video in 802.11 Networks. | 0 | 0.34 | 2016 |
Non-Parametric Early Warning Signals from Volumetric DDoS Attacks. | 0 | 0.34 | 2016 |
Evaluation of Sybil attack detection approaches in the Internet of Things content dissemination | 2 | 0.40 | 2016 |
Virtual and unified address assignment for continuous communication in mobile networks | 0 | 0.34 | 2016 |
AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle. | 15 | 0.94 | 2016 |
Anticipating Moves to Prevent Botnet Generated DDoS Flooding Attacks. | 0 | 0.34 | 2016 |
MAC Protocols for IEEE 802.11ax: Avoiding Collisions on Dense Networks. | 0 | 0.34 | 2016 |
A New Queue Discipline for Reducing Bufferbloat Effects in HetNet Concurrent Multipath Transfer. | 0 | 0.34 | 2016 |
Cognitive Radio Based Connectivity Management for Resilient End-to-End Communications in VANETs | 3 | 0.42 | 2016 |
Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things | 15 | 0.72 | 2015 |
Programmable Networks – From Software Defined Radio to Software Defined Networking | 19 | 0.71 | 2015 |
Data similarity aware dynamic node clustering in wireless sensor networks. | 7 | 0.45 | 2015 |
Mitigating DoS attacks in identity management systems through reorganizations | 3 | 0.39 | 2015 |
Aspirations, challenges, and open issues for software-based 5G networks in extremely dense and heterogeneous scenarios | 4 | 0.41 | 2015 |
Interoperability issues on heterogeneous wireless communication for smart cities. | 8 | 0.56 | 2015 |
Firefly-inspired and robust time synchronization for cognitive radio ad hoc networks | 3 | 0.42 | 2015 |
Connectivity management to support reliable communication on Cognitive vehicular networks | 1 | 0.35 | 2014 |
Interest-Based Forwarding for Satisfying User Preferences in Vehicular Networks. | 0 | 0.34 | 2014 |
Unwanted traffic characterization on IP networks by low interactive honeypot | 1 | 0.36 | 2014 |
A flexible multi-criteria scheme to detect primary user emulation attacks in CRAHNs | 0 | 0.34 | 2013 |