Found: 41
Select item for more details and to access through your institution.
A survey on node localization technologies in UWSNs: Potential solutions, recent advancements, and future directions.
- Published in:
- International Journal of Communication Systems, 2024, v. 37, n. 16, p. 1, doi. 10.1002/dac.5915
- By:
- Publication type:
- Article
NODE STABILITY AWARE ENERGY EFFICIENT SINGLE NODE FAILURE RECOVERY APPROACH FOR WSANS.
- Published in:
- Malaysian Journal of Computer Science, 2016, v. 29, n. 2, p. 106, doi. 10.22452/mjcs.vol29no2.3
- By:
- Publication type:
- Article
Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks.
- Published in:
- Telecommunication Systems, 2024, v. 85, n. 4, p. 601, doi. 10.1007/s11235-024-01105-w
- By:
- Publication type:
- Article
An ant-based QoS-aware routing protocol for heterogeneous wireless sensor networks.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 21, p. 6225, doi. 10.1007/s00500-016-2347-z
- By:
- Publication type:
- Article
Trust model for cluster head validation in underwater wireless sensor networks.
- Published in:
- Underwater Technology, 2017, v. 34, n. 3, p. 107, doi. 10.3723/ut.34.107
- By:
- Publication type:
- Article
Correction to: Convolution Neural Network Having Multiple Channels with Own Attention Layer for Depression Detection from Social Data.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Convolution Neural Network Having Multiple Channels with Own Attention Layer for Depression Detection from Social Data.
- Published in:
- New Generation Computing, 2024, v. 42, n. 1, p. 135, doi. 10.1007/s00354-023-00237-y
- By:
- Publication type:
- Article
Optimal nodes selection in wireless sensor and actor networks based on prioritized mutual exclusion approach.
- Published in:
- Kuwait Journal of Science, 2016, v. 43, n. 1, p. 150
- By:
- Publication type:
- Article
Effective Waste Water Treatment by the Application of Natural Coagulants.
- Published in:
- Advances in Materials Science & Engineering, 2022, p. 1, doi. 10.1155/2022/3023200
- By:
- Publication type:
- Article
Microbial Diversity Reduction in Soil by Long-Term Climate Warming.
- Published in:
- Advances in Materials Science & Engineering, 2022, v. 2022, p. 1, doi. 10.1155/2022/7670890
- By:
- Publication type:
- Article
Impact of Lockdown Measures on Air Quality; A Case Study of Jodhpur.
- Published in:
- Special Education, 2022, v. 1, n. 43, p. 9707
- By:
- Publication type:
- Article
A Hybrid Technique for Searching a Reusable Component from Software Libraries.
- Published in:
- DESIDOC Bulletin of Information Technology, 2007, v. 27, n. 5, p. 27
- By:
- Publication type:
- Article
Room-temperature kinetics of castor-oil-based polyurethane/poly(2-hydroxyethyl methacrylate) interpenetrating polymer networks.
- Published in:
- Journal of Applied Polymer Science, 1994, v. 54, n. 8, p. 1127, doi. 10.1002/app.1994.070540816
- By:
- Publication type:
- Article
Sequential-interpenetrating polymer networks from castor oil-based polyesters. XXVI.
- Published in:
- Journal of Applied Polymer Science, 1993, v. 50, n. 12, p. 2143, doi. 10.1002/app.1993.070501214
- By:
- Publication type:
- Article
Acoustic modeling problem for automatic speech recognition system: conventional methods (Part I).
- Published in:
- International Journal of Speech Technology, 2011, v. 14, n. 4, p. 297, doi. 10.1007/s10772-011-9108-2
- By:
- Publication type:
- Article
A Real Time Distributed Approach for Data Placement in Mission Critical Wireless Sensor Based Applications.
- Published in:
- International Review on Computers & Software, 2009, v. 4, n. 6, p. 704
- By:
- Publication type:
- Article
Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications.
- Published in:
- 2017
- By:
- Publication type:
- Editorial
Hybrid technique for robust and imperceptible multiple watermarking using medical images.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 14, p. 8381, doi. 10.1007/s11042-015-2754-7
- By:
- Publication type:
- Article
Mitigation of DDoS Attack Using Moving Target Defense in SDN.
- Published in:
- Wireless Personal Communications, 2023, v. 131, n. 4, p. 2429, doi. 10.1007/s11277-023-10544-8
- By:
- Publication type:
- Article
CHANGE MANAGEMENT AND SOFTWARE REUSE SUPPORTIVE 'GENETIC INFORMATION SYSTEM DEVELOPMENT AND MAINTENANCE' MODEL.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2009, v. 19, n. 1, p. 113, doi. 10.1142/S0218194009004076
- By:
- Publication type:
- Article
Smart Fog-Based Video Surveillance with Privacy Preservation based on Blockchain.
- Published in:
- Wireless Personal Communications, 2022, v. 124, n. 2, p. 1677, doi. 10.1007/s11277-021-09426-8
- By:
- Publication type:
- Article
Crypto-Preserving Investigation Framework for Deep Learning Based Malware Attack Detection for Network Forensics.
- Published in:
- Wireless Personal Communications, 2022, v. 122, n. 3, p. 2701, doi. 10.1007/s11277-021-09026-6
- By:
- Publication type:
- Article
Detection and Analysis of TCP-SYN DDoS Attack in Software-Defined Networking.
- Published in:
- Wireless Personal Communications, 2021, v. 118, n. 4, p. 2295, doi. 10.1007/s11277-021-08127-6
- By:
- Publication type:
- Article
SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs.
- Published in:
- Wireless Personal Communications, 2020, v. 113, n. 1, p. 1, doi. 10.1007/s11277-020-07175-8
- By:
- Publication type:
- Article
Protocol Stack of Underwater Wireless Sensor Network: Classical Approaches and New Trends.
- Published in:
- Wireless Personal Communications, 2019, v. 104, n. 3, p. 995, doi. 10.1007/s11277-018-6064-z
- By:
- Publication type:
- Article
Deployment Based Attack Resistant Key Distribution with Non Overlapping Key Pools in WSN.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 4, p. 1541, doi. 10.1007/s11277-018-5291-7
- By:
- Publication type:
- Article
A Hybrid Approach for Path Vulnerability Matrix on Random Key Predistribution for Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 3327, doi. 10.1007/s11277-016-3779-6
- By:
- Publication type:
- Article
Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 2, p. 687, doi. 10.1007/s11277-016-3302-0
- By:
- Publication type:
- Article
BIIR: A Beacon Information Independent VANET Routing Algorithm with Low Broadcast Overhead.
- Published in:
- Wireless Personal Communications, 2016, v. 87, n. 3, p. 869, doi. 10.1007/s11277-015-2620-y
- By:
- Publication type:
- Article
Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 3, p. 2133, doi. 10.1007/s11277-015-2505-0
- By:
- Publication type:
- Article
Robust and Imperceptible Dual Watermarking for Telemedicine Applications.
- Published in:
- Wireless Personal Communications, 2015, v. 80, n. 4, p. 1415, doi. 10.1007/s11277-014-2091-6
- By:
- Publication type:
- Article
Mobility Models and their Affect on Data Aggregation and Dissemination in Vehicular Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 3, p. 2237, doi. 10.1007/s11277-014-1983-9
- By:
- Publication type:
- Article
A Hybrid Timer Based Single Node Failure Recovery Approach for WSANs.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 3, p. 2155, doi. 10.1007/s11277-014-1631-4
- By:
- Publication type:
- Article
Network Partitioning Recovery Mechanisms in WSANs: a Survey.
- Published in:
- Wireless Personal Communications, 2013, v. 72, n. 2, p. 857, doi. 10.1007/s11277-013-1046-7
- By:
- Publication type:
- Article
A Framework For Handling Local Broadcast Storm Using Probabilistic Data Aggregation In VANET.
- Published in:
- Wireless Personal Communications, 2013, v. 72, n. 1, p. 315, doi. 10.1007/s11277-013-1016-0
- By:
- Publication type:
- Article
RAKSHAM: Responsive approach to Knock‐off scavenging hackers and attack mitigation.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2024, v. 35, n. 1, p. 1, doi. 10.1002/ett.4904
- By:
- Publication type:
- Article
A cost‐effective attack matrix based key management scheme with dominance key set for wireless sensor network security.
- Published in:
- International Journal of Communication Systems, 2018, v. 31, n. 12, p. 1, doi. 10.1002/dac.3713
- By:
- Publication type:
- Article
A novel fault detection and recovery technique for cluster‐based underwater wireless sensor networks.
- Published in:
- International Journal of Communication Systems, 2018, v. 31, n. 4, p. 1, doi. 10.1002/dac.3485
- By:
- Publication type:
- Article
Voting‐based intrusion detection framework for securing software‐defined networks.
- Published in:
- Concurrency & Computation: Practice & Experience, 2020, v. 32, n. 24, p. 1, doi. 10.1002/cpe.5927
- By:
- Publication type:
- Article
IQR-based approach for DDoS detection and mitigation in SDN.
- Published in:
- Defence Technology, 2023, v. 25, p. 76, doi. 10.1016/j.dt.2022.10.006
- By:
- Publication type:
- Article
Room-temperature kinetics of formation of castor-oil-based polyurethane/poly(methyl methacrylate) interpenetrating polymer networks.
- Published in:
- High Performance Polymers, 1993, v. 5, n. 2, p. 155, doi. 10.1088/0954-0083/5/2/007
- By:
- Publication type:
- Article