349 | -- | 358 | Minh Nam Pham. On the secrecy outage probability and performance trade-off of the multi-hop cognitive relay networks |
359 | -- | 370 | R. B. Benisha, S. Raja Ratna. Detection of interruption attack in the wireless networked closed loop industrial control systems |
371 | -- | 381 | Ali Muhammad Ali Rushdi, Ahmad Kamal Hassan, Muhammad Moinuddin. System reliability analysis of small-cell deployment in heterogeneous cellular networks |
383 | -- | 395 | Zufang Dou, Suoping Li, Jaafar Gaber, Xiaokai Chang. Improvement and queuing analysis of the handover mechanism in the high-speed railway communication |
397 | -- | 417 | Kandoussi el Mehdi, Mohamed Hanini, Iman El Mir, Abdelkrim Haqiq. Toward an integrated dynamic defense system for strategic detecting attacks in cloud networks using stochastic game |
419 | -- | 432 | E. Gurumoorthi, Ayyasamy Ayyanar. Cache agent based location aided routing using distance and direction for performance enhancement in VANET |
433 | -- | 441 | Kamal Ghoumid, Amina Ghadban, Sokaina Boukricha, El Miloud Ar-reyouchi, Reda Yahiaoui, Slimane Mekaoui, Marina Raschetti, Catherine Lepers. Spectral coded phase bipolar OCDMA technological implementation thanks to low index modulation filters |
443 | -- | 454 | Muhammad Jawad, Muhammad Zeeshan. A novel algorithm for frequency de-hopping in radars using agile bandpass sampling for electonic support measurement |
455 | -- | 467 | Yan Wu, Hu Xiong, Chuanjie Jin. A multi-use unidirectional certificateless proxy re-signature scheme |
469 | -- | 489 | Sherali Zeadally, Juan Antonio Guerrero Ibáñez, Juan Contreras-Castillo. A tutorial survey on vehicle-to-vehicle communications |