Issue | Title | |
Vol 2, No 6 (2015) | Time Based Fault Detection and Isolation in Wireless Sensors Network | Abstract PDF |
Imane Merzougui, Youssef Benabbassi | ||
Vol 9, No 5 (2022) | Towards an Adaptive Routing Protocol for Low Power and Lossy Networks (RPL) for Reliable and Energy Efficient Communication in the Internet of Underwater Things (IoUT) | Abstract PDF |
R. Saravanan, T. Sakthivel, P. Karpagam, K. Gunasekaran | ||
Vol 10, No 1 (2023) | Towards Blockchain-Based Secure IoT Communication for 5G Enabled Intelligent Transportation System | Abstract PDF |
Sakthi Kumaresh | ||
Vol 8, No 1 (2021) | Towards Improved Detection of Intrusions with Constraint-Based Clustering (CBC) | Abstract PDF |
J. Rene Beulah, C. Pretty Diana Cyril, S. Geetha, D. Shiny Irene | ||
Vol 11, No 1 (2024) | TriChain: Kangaroo-Based Intrusion Detection for Secure Multipath Route Discovery and Route Maintenance in MANET Using Advanced Routing Protocol | Abstract PDF |
Jayantkumar A. Rathod, Manjunath Kotari | ||
Vol 9, No 6 (2022) | Trust Management Techniques and their Challenges in Cloud Computing: A Review | Abstract PDF |
Pooja Goyal, Sukhvinder Singh Deora | ||
Vol 9, No 3 (2022) | Trust-Based Co-Operative Cross-Layer Routing Protocol for Industrial Wireless Sensor Networks | Abstract PDF |
Manish Panchal, Raksha Upadhyay, Prakash Vyavahare | ||
Vol 8, No 4 (2021) | Trust-Based Energy Efficient Secure Multipath Routing in MANET Using LF-SSO and SH2E | Abstract PDF |
Valanto Alappatt, Joe Prathap P. M. | ||
Vol 6, No 5 (2019) | Two-Level Grid Access Control Model Based on Resource Performance and Request Priority | Abstract PDF |
Sarra Namane, Nacira Ghoualmi | ||
Vol 3, No 6 (2016) | Usage of Machine Learning for Intrusion Detection in a Network | Abstract PDF |
Prachi | ||
Vol 11, No 1 (2024) | Vehicular Ad Hoc Networks Assisted Clustering Nodular Framework for Optimal Packet Routing and Scaling | Abstract PDF |
V. M. Niaz Ahamed, K. Sivaraman | ||
Vol 5, No 4 (2018) | Virtualization and IoT Resource Management:A Survey | Abstract PDF |
Saniya Zahoor, Roohie Naaz Mir | ||
Vol 7, No 1 (2020) | Vulnerability Exploitations Using Steganography in PDF Files | Abstract PDF |
Istteffanny Isloure Araujo, Hassan Kazemian | ||
Vol 8, No 4 (2021) | Whale Optimization Routing Protocol for Minimizing Energy Consumption in Cognitive Radio Wireless Sensor Network | Abstract PDF |
J. Ramkumar, R. Vadivel | ||
Vol 5, No 4 (2018) | Wireless Sensor Network Surveillance on Forest Illegal Mining using ‘Planned Behaviour Abortion Tower’:Analytical Modelling | Abstract PDF |
Eric Opoku Osei, James B. Hayfron-Acquah, Michael Asante | ||
Vol 2, No 6 (2015) | Wireless Sensor Network-Based Health Monitoring System for the Elderly and Disabled | Abstract PDF |
Gurkan Tuna, Resul Das, Ayse Tuna | ||
Vol 8, No 4 (2021) | Wormhole Detection Using Encrypted Node IDs and Hop Counts in the Event Report of Statistical En-Route Filtering | Abstract PDF |
Ga-Hyeon An, Tae-Ho Cho | ||
Vol 6, No 3 (2019) | ZBLE:Zone Based Leader Election Energy Constrained AOMDV Routing Protocol | Abstract PDF |
Rani Sahu, Sanjay Sharma, M. A. Rizvi | ||
326 - 343 of 343 Items | First Previous 9 10 11 12 13 14 |
Browse Title Index
Scroll