| 1387 | -- | 1398 | Shameek Bhattacharjee, Shamik Sengupta, Mainak Chatterjee. Vulnerabilities in cognitive radio networks: A survey |
| 1399 | -- | 1410 | Junaid Ansari, Xi Zhang, Petri Mähönen. A decentralized MAC protocol for opportunistic spectrum access in cognitive wireless networks |
| 1411 | -- | 1421 | Ahmad Abbas, Mohamed Younis. Establishing connectivity among disjoint terminals using a mix of stationary and mobile relays |
| 1422 | -- | 1435 | Omar Abdel Wahab, Hadi Otrok, Azzam Mourad. VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks |
| 1436 | -- | 1449 | Maria Estrella Sousa Vieira, Andrés Suárez-González, Manuel Fernández-Veiga, José C. López-Ardao, Cándido López-García. Model selection for long-memory processes in the spectral domain |
| 1450 | -- | 1459 | Y. Sinan Hanay, Abhishek Dwaraki, Kekai Hu, Tilman Wolf. High-performance implementation of in-network traffic pacing for small-buffer networks |
| 1460 | -- | 1470 | Guang Cheng, Yongning Tang. Line speed accurate superspreader identification using dynamic error compensation |
| 1471 | -- | 1484 | Li Ming Chen, Meng Chang Chen, Wanjiun Liao, Yeali S. Sun. A scalable network forensics mechanism for stealthy self-propagating attacks |