The verifier bee: A path planner for drone-based secure location verification – MS IN NS2 SIMULATION |
Black hole attack’s effect mobile ad-hoc networks (MANET)– MS IN NS2 SIMULATION |
Formal verification of the Lowe modified BAN concrete Andrew Secure RPC protocol– MS IN NS2 SIMULATION |
AppGuard: A hardware virtualization based approach on protecting user applications from untrusted commodity operating system– MS IN NS2 SIMULATION |
Design and implementation of multilevel security subsystem based on XACML and WEB services– MS IN NS2 SIMULATION |
Enabling Privacy Mechanisms in Apache Storm– MS IN NS2 SIMULATION |
Difficulty-level metric for cyber security training– MS IN NS2 SIMULATION |
Case study: WIRELESSHART vs ZIGBEE network– MS IN NS2 SIMULATION |
Portable parallelized blowfish via RenderScript– MS IN NS2 SIMULATION |
Improving the Security of Cryptographic Protocol Standards– MS IN NS2 SIMULATION |
Revitalizing the Afghan educational assessment paradigm through ICT– MS IN NS2 SIMULATION |
Intelligent Energy Industrial Systems 4.0– MS IN NS2 SIMULATION |
Introduction to the Innovative Behavioral IS Security and Privacy Research Minitrack– MS IN NS2 SIMULATION |
A literature review on vehicular Adhoc Network for intelligent transport– MS IN NS2 SIMULATION |
Asset tracking in critical power communications infrastructure using passive techniques– MS IN NS2 SIMULATION |
Domotics control system architecture– MS IN NS2 SIMULATION |
Data Management System to Improve Security and Availability in Cloud Storage– MS IN NS2 SIMULATION |
Highlights on analyzing one-way traffic using different tools– MS IN NS2 SIMULATION |
Constructions of Optimal 2-D Optical Orthogonal Codes via Generalized Cyclotomic Classes– MS IN NS2 SIMULATION |
The implementation of IP ID Reference Model in Linux kernel– MS IN NS2 SIMULATION |
Vibration-based secure side channel for medical devices– MS IN NS2 SIMULATION |
Hourly Electricity Demand Response in the Stochastic Day-Ahead Scheduling of Coordinated Electricity and Natural Gas Networks– MS IN NS2 SIMULATION |
Replicated Cache Agent Technique for Wireless Sensor Network– MS IN NS2 SIMULATION |
RUBEN: A Router emUlator for green BackbonE Networks– MS IN NS2 SIMULATION |
Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks– MS IN NS2 SIMULATION |
2015 IEEE MS IN NS2 SIMULATION |