0 | -- | 0 | Mohammed Abdel-Azim, Hossam El-Din Salah, menas ebrahim eissa. Black Hole attack Detection using fuzzy based IDS |
0 | -- | 0 | Nur Hidayah Mohd Saudi, M. A. Faizal, Siti Rahayu Selamat, Rudy Fadhlee M. D, Wan Ahmad Ramzi W. Y.. Revealing the Feature Influence in HTTP Botnet Detection |
0 | -- | 0 | Magdy Ibrahim ElSharkawy. Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as Variable Key |
0 | -- | 0 | Sweta Jain, Vinuraj R. CALAR: Community Aware Location Assisted Routing Framework for Delay Tolerant Networks |
0 | -- | 0 | Aun Yichiet, Selvakumar Manickam, Shankar Karuppayah. A Review on Features' Robustness in High Diversity Mobile Traffic Classifications |
0 | -- | 0 | Chafiq Titouna, Abdelhak Mourad Guéroui, Makhlouf Aliouat, Ado Adamou Abba Ari, Amine Adouane. Distributed Fault-Tolerant Algorithm for Wireless Sensor Networks |
0 | -- | 0 | Selvi E, Shashidhara M. S. Quantum Phase Shift For Energy Conserved Secured Data Communication In Manet |
0 | -- | 0 | Ahmed Saleh. Bio-Inspired Technique: An Adaptive Routing for Reliability and Energy Efficiency Method in Wireless Sensor Networks |
0 | -- | 0 | Eyad Salah Taqieddin. On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols |
0 | -- | 0 | Anant Ram, Manas Kumar Mishra. Mobility Adaptive Density Connected Clustering Approach in Vehicular Ad Hoc Networks |
0 | -- | 0 | Franco Frattolillo. Digital Copyright Protection: Focus on Some Relevant Solutions |
0 | -- | 0 | Firas AlBalas, Wail Mardini, Dua'a Bani-salameh. Optimized Job Scheduling approach based on Genetic algorithms in smart Grid environment |
0 | -- | 0 | Lekha J, Padmavathi Ganapathi. Detection of illegal traffic pattern using Hybrid Improved CART and Multiple Extreme Learning Machine Approach |
0 | -- | 0 | Muhammad Zeeshan, Huma Javed, Sifat Ullah. Discrete R-Contiguous bit Matching mechanism appropriateness for anomaly detection in Wireless Sensor Networks |
0 | -- | 0 | Badr Benmammar, Youcef Benmouna, Asma Amraoui, Francine Krief. A parallel implementation on a multi-core architecture of a dynamic programming algorithm applied in cognitive radio ad hoc networks |
0 | -- | 0 | Venifa Mini G, K. S. Angel Viji. A Comprehensive Cloud Security Model with Enhanced Key Management, Access Control and Data Anonymization Features |
0 | -- | 0 | Sambhaji Sarode, Jagdish W. Bakal. PFPS: Priority-First Packet Scheduler for IEEE 802.15.4 Heterogeneous Wireless Sensor Networks |