0 | -- | 0 | Iman El Mir, Kandoussi el Mehdi, Mohamed Hanini, Abdelkrim Haqiq, Dong Seong Kim. A Game Theoretic approach based virtual machine migration for cloud environment security |
0 | -- | 0 | Shadi Ismail Nashwan. SE-H: A Secure and Efficient Hash Protocol for RFID System |
0 | -- | 0 | Magdy Ibrahim ElSharkawy. Integrating and Securing Video, Audio and Text Using Quaternion Fourier Transform |
0 | -- | 0 | Emran Aljarrah. Deployment of Multi-Fuzzy Model Based Routing in RPL to Support Efficient IoT |
0 | -- | 0 | Pooja Singh, Vikas Pareek, Anil K. Ahlawat. Designing an Energy Efficient Network Using Integration of KSOM, ANN and Data Fusion Techniques |
0 | -- | 0 | Jhum Swain, Binod Kumar Pattanayak, Bibudhendu Pati. A New Approach for DDoS attacks to discriminate the attack level and provide security for DDoS nodes in MANET |
0 | -- | 0 | Mike Yuliana, Wirawan, Suwadi. Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment |
0 | -- | 0 | Imran Khan. Performance Analysis of 5G Cooperative-NOMA for IoT-Intermittent Communication |
0 | -- | 0 | Atef A. Obeidat. Hybrid Approach for Botnet Detection Using K-Means and K-Medoids with Hopfield Neural Network |
0 | -- | 0 | Dina M. Omar, Ahmed M. Khedr. Optimized Clustering Protocol for Balancing Energy in Wireless Sensor Networks |
0 | -- | 0 | Wael Alosaimi, Michal Zak, Khalid Al-Begain, Roobaea Alroobaea, Mehedi Masud. Economic Denial of Sustainability Attacks Mitigation in the Cloud |
0 | -- | 0 | Wan Ahmad Ramzi W. Y., M. A. Faizal, Rudy Fadhlee M. D, Nur Hidayah Mohd Saudi. Revealing Influenced Selected Feature for P2P Botnet Detection |
0 | -- | 0 | Selo Sulistyo, Sahirul Alam. Distributed Channel and Power Level Selection in VANET Based on SINR using Game Model |
0 | -- | 0 | Husna Jamal Abdul Nasir, Ku Ruhana Ku-Mahamud, Eiji Kamioka. Enhanced Ant-Based Routing for Improving Performance of Wireless Sensor Network |
0 | -- | 0 | Movva Pavani, P. Trinatha Rao. Urban Air Pollution Monitoring Using Wireless Sensor Networks: A Comprehensive Review |
0 | -- | 0 | Bhupendra Kumar Gupta, Srikanta Patnaik, Ajit Kumar Nayak, Manas Kumar Mallick. Congestion Managed Multicast Routing in Wireless Mesh Network |
0 | -- | 0 | Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod. State of the Art in Biometric Key Binding and Key Generation Schemes |
0 | -- | 0 | Dixon Salcedo, Cesar Guerrero, Julian Guerrero. Overhead in Available Bandwidth Estimation Tools: Evaluation and Analysis |
0 | -- | 0 | Amiruddin Amiruddin, Anak Agung Putri Ratna, Riri Fitri Sari. New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks |
0 | -- | 0 | Anggun Fitrian Isnawati, Risanuri Hidayat, Selo Sulistyo, I. Wayan Mustika. A Novel Utility Function of Power Control Game in Multi-Channel Cognitive Femtocell Network |
0 | -- | 0 | Wail Mardini, Maad Ebrahim, Mohammed Al-Rudaini. Comprehensive Performance Analysis of RPL Objective Functions in IoT Networks |
0 | -- | 0 | Veeresh Poola, R. Praveen Sam, Shoba Bindhu C. Fuzzy Based Optimal QoS Constraint Services Composition in Mobile Ad Hoc Networks |