| Impedance control network resonant dc-dc converter for wide-range high-efficiency operation – M.TECH IN NS2 SIMULATION |
| On efficient protection design for dynamic multipath provisioning in elastic optical networks– M.TECH IN NS2 SIMULATION |
| Dynamic Shapley value for repeated network games with shock– M.TECH IN NS2 SIMULATION |
| Optimized Distributed Inter-Cell Interference Coordination (ICIC) Scheme Using Projected Subgradient and Network Flow Optimization– M.TECH IN NS2 SIMULATION |
| A Closed-Loop State Estimation Tool for MV Network Monitoring and Operation– M.TECH IN NS2 SIMULATION |
| A Privacy-Preserving Framework for Managing Mobile Ad Requests and Billing Information– M.TECH IN NS2 SIMULATION |
| Special session 12B: Panel: IOT – Reliable? Secure? Or death by a billion cuts?– M.TECH IN NS2 SIMULATION |
| IoT-academia architecture: A profound approach– M.TECH IN NS2 SIMULATION |
| Social network monitoring application for parents with children under thirteen– M.TECH IN NS2 SIMULATION |
| Multivariate embedding based causaltiy detection with short time series– M.TECH IN NS2 SIMULATION |
| Segmentation-Based Image Copy-Move Forgery Detection Scheme– M.TECH IN NS2 SIMULATION |
| SPINN: Suspicion prediction in nuclear networks– M.TECH IN NS2 SIMULATION |
| Disrupting Adaptive Traffic Lights Cycles through Selective Jamming Attacks– M.TECH IN NS2 SIMULATION |
| Location Spoofing Detection for VANETs by a Single Base Station in Rician Fading Channels– M.TECH IN NS2 SIMULATION |
| On the impossibility of efficient self-stabilization in virtual overlays with churn– M.TECH IN NS2 SIMULATION |
| The Rebirth of One-Time Pads—Secure Data Transmission from BAN to Sink– M.TECH IN NS2 SIMULATION |
| Multi-level VM replication based survivability for mission-critical cloud computing– M.TECH IN NS2 SIMULATION |
| Federated identity in real-life applications– M.TECH IN NS2 SIMULATION |
| Bank note authentication using decision tree rules and machine learning techniques– M.TECH IN NS2 SIMULATION |
| System of Systems for Quality-of-Service Observation and Response in Cloud Computing Environments– M.TECH IN NS2 SIMULATION |
| Quantum secured Gigabit Passive Optical Networks– M.TECH IN NS2 SIMULATION |
| A New Quaternion-Based Encryption Method for Dicom Images– M.TECH IN NS2 SIMULATION |
| The Electronic Voting in the Presence of Rational Voters– M.TECH IN NS2 SIMULATION |
| An Access Control Model for Online Social Networks Using User-to-User Relationships– M.TECH IN NS2 SIMULATION |
| Combating Friend Spam Using Social Rejections– M.TECH IN NS2 SIMULATION |
| 2015 IEEE M.TECH IN NS2 SIMULATION |