| UAN01 |
TuDA-MAC: TDMA Without Clock Synchronization in Underwater Acoustic Networks |
Underwater Acoustic Networks |
NS2/2018 |
| UAN02 |
Co-EEORS: Cooperative Energy Efficient Optimal Relay Selection Protocol for Underwater Wireless Sensor Networks |
Underwater Acoustic Networks |
NS2/2018 |
| UAN03 |
Path Finding for Maximum Value of Information in Multi-Modal Underwater Wireless Sensor Networks |
Underwater Acoustic Networks |
NS2/2018 |
| HN01 |
Green Heterogeneous Networks via an Intelligent Sleep/Wake-up Mechanism and D2D Communications |
Heterogeneous Network |
NS2/2018 |
| WSN01 |
Sparsest Random Sampling for Cluster-based Compressive Data Gathering in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN02 |
Fault-Tolerant Clustering Topology Evolution Mechanism of Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN03 |
Towards Immortal Wireless Sensor Networks by Optimal Energy Beam forming and Data Routing |
Wireless sensor Network |
NS2/2018 |
| WSN03 |
Mobile Data Gathering with Bounded Relay in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN04 |
Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN05 |
FuMAM: Fuzzy-Based Mobile Agent Migration Approach for Data Gathering in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN06 |
QTSAC: An Energy-Efficient MAC Protocol for Delay Minimization in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN07 |
A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN08 |
Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN09 |
Swarm Intelligence Optimization Techniques for Obstacle-Avoidance Mobility-Assisted Localization in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN10 |
A Sidelobe and Energy Optimization Array Node Selection Algorithm for Collaborative Beam forming in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN11 |
Energy Efficiency Maximization in Mobile Wireless Energy Harvesting Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN12 |
Wireless Power Transfer and Data Collection in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN13 |
Energy-Aware Dual-Path Geographic Routing to Bypass Routing Holes in Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN14 |
Secure Knowledge and Cluster-Based Intrusion Detection Mechanism for Smart Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN15 |
A Cooperative Clustering Protocol With Duty Cycling for Energy Harvesting Enabled Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN16 |
HE-MAC: Harvest-Then-Transmit Based Modified EDCF MAC Protocol for Wireless Powered Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN17 |
Hierarchical Clustering-Task Scheduling Policy in Cluster-Based Wireless Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| WSN18 |
Energy Aware Multi-Hop Routing Protocol for WSNs |
Wireless sensor Network |
NS2/2018 |
| WSN19 |
A Comprehensive Trust-Aware Routing Protocol With Multi-Attributes for WSNs |
Wireless sensor Network |
NS2/2018 |
| WSN20 |
Energy Efficiency Maximization in Mobile Wireless Energy Harvesting Sensor Networks |
Wireless sensor Network |
NS2/2018 |
| DTN01 |
Improving Bivious Relay Selection in Vehicular Delay Tolerant Networks |
Delay tolerant network |
NS2/2018 |
| DTN02 |
Detecting Flooding Attack and Accommodating Burst Traffic in Delay-Tolerant Networks |
Delay tolerant network |
NS2/2018 |
| DTN03 |
ARAG: A Routing Algorithm Based on Incentive Mechanisms for DTN With Nodes’ Selfishness |
Delay tolerant network |
NS2/2018 |
| OMNET01 |
A Realistic Distributed Conditional Privacy- Preserving Authentication Scheme for Vehicular Ad Hoc Networks |
VANET |
OMNET/2018 |
| OMNET02 |
An Enhanced Distributed Trust Computing Protocol for VANETs |
VANET |
OMNET/2018 |
| OMNET03 |
Reliable Cooperative Authentication for Vehicular Networks |
VANET |
OMNET/2018 |
| OMNET04 |
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks |
VANET |
OMNET/2018 |
| OMNET05 |
Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET |
VANET |
OMNET/2018 |
| OMNET06 |
Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks |
VANET |
OMNET/2018 |
| OMNET07 |
TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad- |
VANET |
OMNET/2018 |
| OMNET08 |
Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors |
VANET |
OMNET/2018 |
| OMNET09 |
Bidirectional LiFi Attocell Access Point Slicing Scheme |
VANET |
OMNET/2018 |
| OMNET10 |
SLIDE: A Straight Line Conflict Detection and Alerting Algorithm for Multiple Unmanned Aerial Vehicles |
VANET |
OMNET/2018 |
| OMNET11 |
Efficient Access Control for Broadband Power Line Communications in Home Area Networks |
VANET |
OMNET/2018 |
| OMNET12 |
SecSDN-Cloud: Defeating Vulnerable Attacks Through Secure Software-Defined Networks |
VANET |
OMNET/2018 |
| OMNET13 |
Using a Distributed Roadside Unit for the Data Dissemination Protocol in VANET With the Named Data Architecture |
VANET |
OMNET/2018 |
| OMNET14 |
SDN-Enabled Social-Aware Clustering in 5G-VANET Systems |
VANET |
OMNET/2018 |
| OMNET15 |
TMED: A Spider Web-Like Transmission Mechanism for Emergency Data in Vehicular Ad Hoc Networks |
VANET |
OMNET/2018 |
| OMNET16 |
Bus Trajectory-Based Street-Centric Routing for Message Delivery in Urban Vehicular Ad hoc Networks |
VANET |
OMNET/2018 |
| OMNET17 |
Efficient Privacy-preserving Scheme for Real-time Location Data in Vehicular Ad-hoc Network |
VANET |
OMNET/2018 |
| OMNET18 |
Real-Time Path Planning in Urban Area via VANET-Assisted Traffic Information Sharing |
VANET |
VANET |
| NM01 |
An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs |
MANET |
NS2/2018 |
| NM02 |
Distributed Partition Detection With Dynamic Replication Management in a DHT-Based MANET |
MANET |
NS2/2018 |
| NM03 |
Bandwidth-Satisfied and Coding-Aware Multicast Protocol in MANETs |
MANET |
NS2/2018 |
| NM04 |
A Comparison of Stateless Position-based Packet Routing Algorithms for FANETs |
MANET |
NS2/2018 |
| NM05 |
Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT |
MANET |
NS2/2018 |
| CRN01 |
A Contention-Free Reporting Scheme Based MAC Protocol for Cooperative Spectrum Sensing in Cognitive Radio Networks |
Cognitive Radio Network |
NS2/2018 |
| CRN02 |
Maximizing Cognitive Radio Networks Throughput Using Limited Historical Behavior of Primary Users |
Cognitive Radio Network |
NS2/2018 |
| CRN03 |
RARE: A Spectrum Aware Cross-Layer MAC Protocol for Cognitive Radio Ad-Hoc Networks |
Cognitive Radio Network |
NS2/2018 |
| CRN04 |
TDMA-Based Cooperative NC MAC Scheme for Two-Way Relaying Networks |
Cognitive Radio Network |
NS2/2018 |
| CRN 05 |
Joint Resource Allocation for Wireless Energy Harvesting Enabled Sensor Networks |
cognitive radio network |
NS2/2018 |
| UAN04 |
An Energy-Aware and Void-Avoidable Routing Protocol for Underwater Sensor Networks |
Underwater Acoustic Networks |
NS2/2018 |
| UAN05 |
Revisiting Source Routing for Underwater Networking: The SUN Protocol |
Underwater Acoustic Networks |
NS2/2018 |
| JNS32 |
Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack |
Network Security |
Ns2/2018 |
| JNS33 |
Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT |
Network Security |
Ns2/2018 |
| JNS34 |
Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks |
Network Security |
Ns2/2018 |
| JNS35 |
Scalable and Distributed Detection Analysis on Wormhole Links in Wireless Sensor Networks for Networked Systems |
Network Security |
Ns2/2018 |
| JNS36 |
A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical Network |
Network Security |
Ns2/2018 |
| JNS37 |
A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks |
Network Security |
Ns2/2018 |