Journal: Computer Communications

Volume 36, Issue 13

1387 -- 1398Shameek Bhattacharjee, Shamik Sengupta, Mainak Chatterjee. Vulnerabilities in cognitive radio networks: A survey
1399 -- 1410Junaid Ansari, Xi Zhang, Petri Mähönen. A decentralized MAC protocol for opportunistic spectrum access in cognitive wireless networks
1411 -- 1421Ahmad Abbas, Mohamed Younis. Establishing connectivity among disjoint terminals using a mix of stationary and mobile relays
1422 -- 1435Omar Abdel Wahab, Hadi Otrok, Azzam Mourad. VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks
1436 -- 1449Maria Estrella Sousa Vieira, Andrés Suárez-González, Manuel Fernández-Veiga, José C. López-Ardao, Cándido López-García. Model selection for long-memory processes in the spectral domain
1450 -- 1459Y. Sinan Hanay, Abhishek Dwaraki, Kekai Hu, Tilman Wolf. High-performance implementation of in-network traffic pacing for small-buffer networks
1460 -- 1470Guang Cheng, Yongning Tang. Line speed accurate superspreader identification using dynamic error compensation
1471 -- 1484Li Ming Chen, Meng Chang Chen, Wanjiun Liao, Yeali S. Sun. A scalable network forensics mechanism for stealthy self-propagating attacks