| The verifier bee: A path planner for drone-based secure location verification – MS IN NS2 SIMULATION |
| Black hole attack’s effect mobile ad-hoc networks (MANET)– MS IN NS2 SIMULATION |
| Formal verification of the Lowe modified BAN concrete Andrew Secure RPC protocol– MS IN NS2 SIMULATION |
| AppGuard: A hardware virtualization based approach on protecting user applications from untrusted commodity operating system– MS IN NS2 SIMULATION |
| Design and implementation of multilevel security subsystem based on XACML and WEB services– MS IN NS2 SIMULATION |
| Enabling Privacy Mechanisms in Apache Storm– MS IN NS2 SIMULATION |
| Difficulty-level metric for cyber security training– MS IN NS2 SIMULATION |
| Case study: WIRELESSHART vs ZIGBEE network– MS IN NS2 SIMULATION |
| Portable parallelized blowfish via RenderScript– MS IN NS2 SIMULATION |
| Improving the Security of Cryptographic Protocol Standards– MS IN NS2 SIMULATION |
| Revitalizing the Afghan educational assessment paradigm through ICT– MS IN NS2 SIMULATION |
| Intelligent Energy Industrial Systems 4.0– MS IN NS2 SIMULATION |
| Introduction to the Innovative Behavioral IS Security and Privacy Research Minitrack– MS IN NS2 SIMULATION |
| A literature review on vehicular Adhoc Network for intelligent transport– MS IN NS2 SIMULATION |
| Asset tracking in critical power communications infrastructure using passive techniques– MS IN NS2 SIMULATION |
| Domotics control system architecture– MS IN NS2 SIMULATION |
| Data Management System to Improve Security and Availability in Cloud Storage– MS IN NS2 SIMULATION |
| Highlights on analyzing one-way traffic using different tools– MS IN NS2 SIMULATION |
| Constructions of Optimal 2-D Optical Orthogonal Codes via Generalized Cyclotomic Classes– MS IN NS2 SIMULATION |
| The implementation of IP ID Reference Model in Linux kernel– MS IN NS2 SIMULATION |
| Vibration-based secure side channel for medical devices– MS IN NS2 SIMULATION |
| Hourly Electricity Demand Response in the Stochastic Day-Ahead Scheduling of Coordinated Electricity and Natural Gas Networks– MS IN NS2 SIMULATION |
| Replicated Cache Agent Technique for Wireless Sensor Network– MS IN NS2 SIMULATION |
| RUBEN: A Router emUlator for green BackbonE Networks– MS IN NS2 SIMULATION |
| Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks– MS IN NS2 SIMULATION |
| 2015 IEEE MS IN NS2 SIMULATION |