All Stories

  1. A survey of malware analysis using community detection algorithms
  2. Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends
  3. Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user’s connectivity experience
  4. Secure transfer of environmental data to enhance human decision accuracy
  5. Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society
  6. Preventive Policy Enforcement with Minimum User Intervention Against SMS Malware in Android Devices
  7. Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink
  8. Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks
  9. Intertwined path formation and MAC scheduling for fast delivery of aggregated data in WSN
  10. Low delay and secure M2M communication mechanism for eHealthcare
  11. Third line of defense strategy to fight against SMS-based malware in android smartphones
  12. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems
  13. Spam Trapping System: Novel security framework to fight against spam botnets
  14. Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: Solutions and Challenges
  15. SMART: Secure Multi-pAths Routing for wireless sensor neTworks
  16. DZ50: Energy-efficient Wireless Sensor Mote Platform for Low Data Rate Applications
  17. Half-Symmetric Lens based localization algorithm for wireless sensor networks
  18. MOB-TOSSIM: An Extension Framework for TOSSIM Simulator to Support Mobility in Wireless Sensor and Actuator Networks
  19. Semi-structured and unstructured data aggregation scheduling in wireless sensor networks
  20. Distributed algorithm for the actor coverage problem in WSN-based precision irrigation applications
  21. A resource-based mutual exclusion algorithm supporting dynamic acting range and mobility for Wireless sensor and Actor Networks
  22. A Comparison on MANETs’ Service Replication Schemes: Interest versus Topology Prediction
  23. Efficient Monitoring Mechanisms for Cooperative Storage in Mobile Ad-Hoc Networks: Detection Time and Accuracy Tradeoffs
  24. Data replication protocols for mobile ad-hoc networks: a survey and taxonomy
  25. Balancing the tradeoffs between scalability and availability in mobile ad hoc networks with a flat hashing-based location service
  26. A Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks
  27. Self-stabilizing algorithm for high service availability in spite of concurrent topology changes in ad hoc mobile networks
  28. A distributed mutual exclusion algorithm over multi-routing protocol for mobilead hocnetworks
  29. SQUIRREL: Self-Organizing Qos-roUting for IntRa-flow Contention in Ad-Hoc wiRELess Networks
  30. Low-Cost and Accurate Intra-flow Contention-Based Admission Control for IEEE 802.11 Ad Hoc Networks
  31. Admission Control Scheme and Bandwidth Management Protocol for 802.11 Ad hoc Networks
  32. Enabling ad-hoc collaboration between mobile users in the $\mathcal{MESSENGER}$ project
  33. A pull-based service replication protocol in mobile ad hoc networks
  34. Localized Hybrid Data Delivery Scheme using K-hop Clustering Algorithm in Ad Hoc Networks
  35. On Promoting Ad-Hoc Collaboration Among Messengers
  36. Ad-Hoc Collaboration Between Messengers: Operations and Incentives
  37. ELS: Energy-Aware Some-for-Some Location Service for Ad Hoc Mobile Networks
  38. A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks
  39. Les Protocoles de routage dans les réseaux mobiles Ad Hoc
  40. Mobility impact on mobile ad hoc routing protocols