1 | -- | 17 | Izabella V. Lokshina, Cees J. M. Lanting. Analysis of Queueing Networks in Equilibrium: Numerical Steady-State Solutions of Markov Chains |
18 | -- | 36 | Faten Mashta, Wissam Altabban, Mohieddin Wainakh. Two-Stage Spectrum Sensing for Cognitive Radio Using Eigenvalues Detection |
37 | -- | 51 | Sultan Almuhammadi, Omar Mohammed Bawazeer. Performance and Security Tradeoffs in Cryptographic Hash Functions |
52 | -- | 64 | Paul Gavrikov, Matthias Lai, Thomas Michael Wendt. Exploring Non-Idealities in Real Device Implementations of Bluetooth Mesh |
65 | -- | 73 | Faeik T. Al Rabee, Richard D. Gitlin. Uplink Power-Domain Non-Orthogonal Multiple Access (NOMA): Bit Error Rate Performance With Channel Estimation Errors |
74 | -- | 87 | Mohamed Hadded, Khalifa Toumi, Anis Laouiti, Paul Mühlethaler. A Trust Framework for Centralized TDMA Scheduling Mechanism in Vehicular Ad hoc Networks |
88 | -- | 103 | Dimitris N. Kanellopoulos, Ali H. Wheeb. Simulated Performance of TFRC, DCCP, SCTP, and UDP Protocols Over Wired Networks |
104 | -- | 117 | Soon Heng Mavric Tan, Chai Kiat Yeo. GPS Location Spoofing and FM Broadcast Intrusion Using Software-Defined Radio |
118 | -- | 131 | Mingsheng Yin, Santiago Figueroa, Javier Añorga, Saioa Arrizabalaga, Yan Sun. IACAP: Internet-Exposed Assets Cybersecurity Analysis Platform |
132 | -- | 140 | Hasita Kaja, Cory C. Beard. A Multi-Layered Reliability Approach in Vehicular Ad-Hoc Networks |