UAN01 |
TuDA-MAC: TDMA Without Clock Synchronization in Underwater Acoustic Networks |
Underwater Acoustic Networks |
NS2/2018 |
UAN02 |
Co-EEORS: Cooperative Energy Efficient Optimal Relay Selection Protocol for Underwater Wireless Sensor Networks |
Underwater Acoustic Networks |
NS2/2018 |
UAN03 |
Path Finding for Maximum Value of Information in Multi-Modal Underwater Wireless Sensor Networks |
Underwater Acoustic Networks |
NS2/2018 |
HN01 |
Green Heterogeneous Networks via an Intelligent Sleep/Wake-up Mechanism and D2D Communications |
Heterogeneous Network |
NS2/2018 |
WSN01 |
Sparsest Random Sampling for Cluster-based Compressive Data Gathering in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN02 |
Fault-Tolerant Clustering Topology Evolution Mechanism of Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN03 |
Towards Immortal Wireless Sensor Networks by Optimal Energy Beam forming and Data Routing |
Wireless sensor Network |
NS2/2018 |
WSN03 |
Mobile Data Gathering with Bounded Relay in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN04 |
Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN05 |
FuMAM: Fuzzy-Based Mobile Agent Migration Approach for Data Gathering in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN06 |
QTSAC: An Energy-Efficient MAC Protocol for Delay Minimization in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN07 |
A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN08 |
Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN09 |
Swarm Intelligence Optimization Techniques for Obstacle-Avoidance Mobility-Assisted Localization in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN10 |
A Sidelobe and Energy Optimization Array Node Selection Algorithm for Collaborative Beam forming in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN11 |
Energy Efficiency Maximization in Mobile Wireless Energy Harvesting Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN12 |
Wireless Power Transfer and Data Collection in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN13 |
Energy-Aware Dual-Path Geographic Routing to Bypass Routing Holes in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN14 |
Secure Knowledge and Cluster-Based Intrusion Detection Mechanism for Smart Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN15 |
A Cooperative Clustering Protocol With Duty Cycling for Energy Harvesting Enabled Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN16 |
HE-MAC: Harvest-Then-Transmit Based Modified EDCF MAC Protocol for Wireless Powered Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN17 |
Hierarchical Clustering-Task Scheduling Policy in Cluster-Based Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
WSN18 |
Energy Aware Multi-Hop Routing Protocol for WSNs |
Wireless sensor Network |
NS2/2018 |
WSN19 |
A Comprehensive Trust-Aware Routing Protocol With Multi-Attributes for WSNs |
Wireless sensor Network |
NS2/2018 |
WSN20 |
Energy Efficiency Maximization in Mobile Wireless Energy Harvesting Sensor Networks |
Wireless sensor Network |
NS2/2018 |
DTN01 |
Improving Bivious Relay Selection in Vehicular Delay Tolerant Networks |
Delay tolerant network |
NS2/2018 |
DTN02 |
Detecting Flooding Attack and Accommodating Burst Traffic in Delay-Tolerant Networks |
Delay tolerant network |
NS2/2018 |
DTN03 |
ARAG: A Routing Algorithm Based on Incentive Mechanisms for DTN With Nodes’ Selfishness |
Delay tolerant network |
NS2/2018 |
OMNET01 |
A Realistic Distributed Conditional Privacy- Preserving Authentication Scheme for Vehicular Ad Hoc Networks |
VANET |
OMNET/2018 |
OMNET02 |
An Enhanced Distributed Trust Computing Protocol for VANETs |
VANET |
OMNET/2018 |
OMNET03 |
Reliable Cooperative Authentication for Vehicular Networks |
VANET |
OMNET/2018 |
OMNET04 |
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks |
VANET |
OMNET/2018 |
OMNET05 |
Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET |
VANET |
OMNET/2018 |
OMNET06 |
Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks |
VANET |
OMNET/2018 |
OMNET07 |
TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad- |
VANET |
OMNET/2018 |
OMNET08 |
Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors |
VANET |
OMNET/2018 |
OMNET09 |
Bidirectional LiFi Attocell Access Point Slicing Scheme |
VANET |
OMNET/2018 |
OMNET10 |
SLIDE: A Straight Line Conflict Detection and Alerting Algorithm for Multiple Unmanned Aerial Vehicles |
VANET |
OMNET/2018 |
OMNET11 |
Efficient Access Control for Broadband Power Line Communications in Home Area Networks |
VANET |
OMNET/2018 |
OMNET12 |
SecSDN-Cloud: Defeating Vulnerable Attacks Through Secure Software-Defined Networks |
VANET |
OMNET/2018 |
OMNET13 |
Using a Distributed Roadside Unit for the Data Dissemination Protocol in VANET With the Named Data Architecture |
VANET |
OMNET/2018 |
OMNET14 |
SDN-Enabled Social-Aware Clustering in 5G-VANET Systems |
VANET |
OMNET/2018 |
OMNET15 |
TMED: A Spider Web-Like Transmission Mechanism for Emergency Data in Vehicular Ad Hoc Networks |
VANET |
OMNET/2018 |
OMNET16 |
Bus Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad hoc Networks |
VANET |
OMNET/2018 |
OMNET17 |
Efficient Privacy-preserving Scheme for Real-time Location Data in Vehicular Ad-hoc Network |
VANET |
OMNET/2018 |
OMNET18 |
Real-Time Path Planning in Urban Area via VANET-Assisted Traffic Information Sharing |
VANET |
VANET |
NM01 |
An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs |
MANET |
NS2/2018 |
NM02 |
Distributed Partition Detection With Dynamic Replication Management in a DHT-Based MANET |
MANET |
NS2/2018 |
NM03 |
Bandwidth-Satisfied and Coding-Aware Multicast Protocol in MANETs |
MANET |
NS2/2018 |
NM04 |
A Comparison of Stateless Position-based Packet Routing Algorithms for FANETs |
MANET |
NS2/2018 |
NM05 |
Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT |
MANET |
NS2/2018 |
CRN01 |
A Contention-Free Reporting Scheme Based MAC Protocol for Cooperative Spectrum Sensing in Cognitive Radio Networks |
Cognitive Radio Network |
NS2/2018 |
CRN02 |
Maximizing Cognitive Radio Networks Throughput Using Limited Historical Behavior of Primary Users |
Cognitive Radio Network |
NS2/2018 |
CRN03 |
RARE: A Spectrum Aware Cross-Layer MAC Protocol for Cognitive Radio Ad-Hoc Networks |
Cognitive Radio Network |
NS2/2018 |
CRN04 |
TDMA-Based Cooperative NC MAC Scheme for Two-Way Relaying Networks |
Cognitive Radio Network |
NS2/2018 |
CRN 05 |
Joint Resource Allocation for Wireless Energy Harvesting Enabled Sensor Networks |
cognitive radio network |
NS2/2018 |
UAN04 |
An Energy-Aware and Void-Avoidable Routing Protocol for Underwater Sensor Networks |
Underwater Acoustic Networks |
NS2/2018 |
UAN05 |
Revisiting Source Routing for Underwater Networking: The SUN Protocol |
Underwater Acoustic Networks |
NS2/2018 |
JNS32 |
Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack |
Network Security |
Ns2/2018 |
JNS33 |
Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT |
Network Security |
Ns2/2018 |
JNS34 |
Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks |
Network Security |
Ns2/2018 |
JNS35 |
Scalable and Distributed Detection Analysis on Wormhole Links in Wireless Sensor Networks for Networked Systems |
Network Security |
Ns2/2018 |
JNS36 |
A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical Network |
Network Security |
Ns2/2018 |
JNS37 |
A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks |
Network Security |
Ns2/2018 |