Towards Fast and Reliable Multihop Routing in VANETs | 3 | 0.42 | 2020 |
Multiple Path Infrastructure-less Networks A Cooperative Approach | 1 | 0.41 | 2019 |
Revisiting Mobile Advertising Threats with MAdLife | 2 | 0.36 | 2019 |
Frequency Injection Interfacing: A Novel Method For Delivering External Information To An Ofdm Receiver Physical Layer | 0 | 0.34 | 2017 |
Vehicle-to-Vehicle LOS Large-Scale Doppler Channel Model Using GSCM | 0 | 0.34 | 2017 |
Cepstral Analysis for Classifying Car Collisions in LOS/NLOS Vehicle-to-Vehicle Networks. | 2 | 0.40 | 2017 |
In-depth Survey of Digital Advertising Technologies | 5 | 0.48 | 2016 |
Towards a Framework to Facilitate the Mobile Advertising Ecosystem | 0 | 0.34 | 2016 |
An Efficient Sch Utilization Scheme For Ieee 1609.4 Multi-Channel Environments In Vanets | 0 | 0.34 | 2016 |
Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking | 0 | 0.34 | 2014 |
An Empirical Study of TCP Vulnerabilities in Critical Power System Devices | 5 | 0.56 | 2014 |
Efficient safety message forwarding using multi-channels in low density VANETs | 0 | 0.34 | 2014 |
Active deception model for securing cloud infrastructure | 1 | 0.38 | 2014 |
Orthogonal frequency division multiple access resource allocation in mobile multihop relay networks using an adaptive frame structure. | 0 | 0.34 | 2013 |
Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks | 5 | 0.41 | 2013 |
NAVSEC: a recommender system for 3D network security visualizations. | 2 | 0.36 | 2013 |
P3D: A parallel 3D coordinate visualization for advanced network scans | 4 | 0.43 | 2013 |
Characterizing hidden nodes with experimental evaluation in noisy MANETs | 0 | 0.34 | 2013 |
Dynamic Service-Channels Allocation (DSCA) in vehicular ad-hoc networks | 2 | 0.38 | 2013 |
Throughput Enhancement Of Manets: Packet Fragmentation With Hidden Stations And Bers | 4 | 0.39 | 2012 |
Reinforcement Learning for Repeated Power Control Game in Cognitive Radio Networks. | 28 | 0.94 | 2012 |
Introducing Lane Based Sectoring For Routing In Vanets | 0 | 0.34 | 2012 |
3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security | 2 | 0.36 | 2012 |
Plugging the leaks without unplugging your network in the midst of Disaster | 0 | 0.34 | 2012 |
Further Improved Remote User Authentication Scheme | 6 | 0.49 | 2011 |
Error tolerance in wireless OFDM data transmission using signal quality driven symbol Re-mapping | 1 | 0.37 | 2011 |
Fast broadcast at the intersection in VANET | 6 | 0.67 | 2011 |
Asynchronous Power Control Game with Channel Outage Constraints in Cognitive Radio Networks | 5 | 0.62 | 2011 |
Handshaking Vs. Instant Broadcast In Vanet Safety Message Routing | 4 | 0.52 | 2011 |
Time-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks | 1 | 0.35 | 2010 |
Cross-Layer Design of DiffServ Architecture for End-to-End QoS in IEEE 802.16 Multi-Hop Mesh/Relay Networks with IEEE 802.11e WLANs | 2 | 0.40 | 2010 |
An Efficient Authentication Scheme For Security And Privacy Preservation In V2i Communications | 2 | 0.47 | 2010 |
VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks | 9 | 0.61 | 2010 |
A Centralized Spectrum Sharing Scheme for Access Points in IEEE 802.11 Networks | 1 | 0.38 | 2010 |
Capacity and Delay Scaling in Cognitive Radio Ad Hoc Networks: Impact of Primary User Activity | 4 | 0.44 | 2010 |
Learning through Reinforcement for Repeated Power Control Game in Cognitive Radio Networks | 4 | 0.53 | 2010 |
COMIC: intelligent contention window control for distributed medium access | 6 | 0.43 | 2010 |
An adaptive on-demand channel estimation for vehicular ad hoc networks | 3 | 0.48 | 2010 |
Analysis of Varying AS Path Lengths from the Edge of the Network | 0 | 0.34 | 2010 |
An adaptive polling algorithm with differentiation strategy in IEEE 802.16 multi-hop networks with IEEE 802.11e WLANs | 1 | 0.36 | 2009 |
Performance Analysis of Hybrid Infrastructure Mesh/Relay Networks of IEEE 802.16 with IEEE 802.11 WLANs for Multimedia Communications | 0 | 0.34 | 2009 |
Robust Real-Time Multimedia Transmissions in Wireless Ad Hoc Networks | 0 | 0.34 | 2009 |
Toward Revealing Kernel Malware Behavior in Virtual Execution Environments | 16 | 0.75 | 2009 |
An Adaptive End-to-End Delay Assurance Algorithm with DiffServ Architecture in IEEE 802.11e/IEEE 802.16 Hybrid Mesh/Relay Networks | 2 | 0.44 | 2009 |
Shepherding Loadable Kernel Modules through On-demand Emulation | 7 | 0.51 | 2009 |
Key challenges in securing WiMAX mesh networks | 3 | 0.52 | 2009 |
Passive classification of wireless NICs during rate switching | 4 | 0.45 | 2008 |
Designing Secure Protocols for Wireless Sensor Networks | 8 | 0.60 | 2008 |
Passive classification of wireless NICs during active scanning | 3 | 0.43 | 2008 |
Dynamic Optimal Fragmentation with Rate Adaptation for Goodput Enhancement in WLANs | 4 | 0.43 | 2007 |