0 | -- | 0 | Esmael Verano Maliberan. Modified SHA1: A Hashing Solution to Secure Web Applications through Login Authentication |
0 | -- | 0 | Mohammed Falah Abood Salman, Leili Farzinvash. A Hybrid Algorithm for Reliable and Energy-efficient Data Gathering in Wireless Sensor Networks |
0 | -- | 0 | Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang. Efficient and Secure ECDSA Algorithm and its Applications: A Survey |
0 | -- | 0 | Rafat Ahmed Alhanani, Jaafar Abouchabaka, Najat Rafalia. CDS-MIP: CDS-based Multiple Itineraries Planning for mobile agents in wireless sensor network |
0 | -- | 0 | Zheng Wei Clement Chan, Chuah Chai Wen, Janaka Alawatugoda. Review on Leakage Resilient Key Exchange Security Model |
0 | -- | 0 | Mohamed El Ghazouani, Moulay Ahmed El Kiram, Er-Rajy Latifa. Blockchain & Multi-Agent System: A New Promising Approach for Cloud Data Integrity Auditing with Deduplication |
0 | -- | 0 | Bongisizwe Erasmus Buthelezi, Maredi Mphahlele, Deon Du Plessis, Solly Maswikaneng, Topside E. Mathonsi. ZigBee Healthcare Monitoring System for Ambient Assisted Living Environments |
0 | -- | 0 | Mohammed Alsaedi. Image Encryption and Decryption Using Chua's Circuits |
0 | -- | 0 | Hamza Toulni, Mounia Miyara, Benayad Nsiri, Mohcine Boudhane. Traffic congestion prevention system |
0 | -- | 0 | Zouhair Chiba. New Anomaly Network Intrusion Detection System in Cloud Environment Based on Optimized Back Propagation Neural Network Using Improved Genetic Algorithm |
0 | -- | 0 | Muhammad Biben Triadi, Doan Perdana, Rendy Munadi, Wenzao Li. A New Variant of Game Theory Based Decision Making (GTDM) Algorithm Routing Protocols to Improve Energy Efficiency on Vehicular Delay Tolerant Network (VDTN) |
0 | -- | 0 | Dina M. Omar, Ahmed Khedr. SEPCS: Prolonging Stability Period of Wireless Sensor Networks using Compressive Sensing |
0 | -- | 0 | Nayab Taj, Mohammad Haseeb Zafar, Shakeel Ahmad Waqas, Humaira Rehman, Madini O. Alassafi, Imran Khan 0006. Smart Relay Selection Scheme Based on Fuzzy Logic with Optimal Power Allocation and Adaptive Data Rate Assignment |
0 | -- | 0 | Felomino Porras Alba, Enrique D. Festijo, Ruji P. Medina. A Distance-Based Data-Mule Scheduling Technique for Lesser Nodal Delay in Wireless Sensor Network |
0 | -- | 0 | Deris Stiawan, Diky Aryandi, Ahmad Heryanto, Tri Wanda Septian, Farkhana Muchtar, Mohammad Yazid Bin Idris, Rahmat Budiarto. Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method |
0 | -- | 0 | Ahmed Jedidi. Workload Cluster Balance Algorithm to Improve Wireless Sensor Network Performance |
0 | -- | 0 | Farizah Yunus. A Rate Control Model of MPEG-4 Encoder for Video Transmission over Wireless Sensor Network |
0 | -- | 0 | Amjad Yosef Hendi, Majed O. Dwairi, Ziad Abdulkareem Al-Qadi, Mohamed S. Soliman. A NOVEL SIMPLE AND HIGHLY SECURE METHOD FOR DATA ENCRYPTION-DECRYPTION |
0 | -- | 0 | Gabriel Vasconcelos, Rodrigo Sanches Miani, Vitor Guizlini, Jefferson Souza. Evaluation of DoS attacks on Commercial Wi-Fi-Based UAVs |
0 | -- | 0 | Mohammed Saber, Abdessamad El Rharras, Rachid Saadane, Hatim Kharraz-Aroussi, Mohamed Wahbi. Artificial Neural Networks, Support Vector Machine And Energy Detection For Spectrum Sensing Based On Real Signals |
0 | -- | 0 | Dalveer Kaur, Neeraj Kumar. Dexterity for Channel Capacity Enhancement in MU-MIMO by Abrogating Interference |
0 | -- | 0 | Alaa Al-Nusirat, Feras Hanandeh, Mohammad Kamel Kharabsheh, Mahmoud Al-Ayyoub, Nahla Al-dhfairi. Dynamic Detection of Software Defects Using Supervised Learning Techniques |
0 | -- | 0 | A. Basnet, Abeer Alsadoon, P. W. C. Prasad, Omar Hisham Alsadoon, Linh Pham, Amr Elchouemi. A Novel Secure Patient Data Transmission through Wireless Body Area Network: Health Tele-Monitoring |
0 | -- | 0 | Karim Benzidane, Saad Khoudali, Leila Fetjah, Said Jai-Andaloussi, Abderrahim Sekkaki. Application-based authentication on an inter-VM traffic in a Cloud environment |