Found: 34
Select item for more details and to access through your institution.
Cyber Security in a 5G-Based Smart Healthcare Network: A Base Station Case Study †.
- Published in:
- Engineering Proceedings, 2023, v. 55, p. 50, doi. 10.3390/engproc2023055050
- By:
- Publication type:
- Article
Anomaly Detection on Network Traffic for the Healthcare Internet of Things †.
- Published in:
- Engineering Proceedings, 2023, v. 55, p. 3, doi. 10.3390/engproc2023055003
- By:
- Publication type:
- Article
A lightweight identity authentication protocol for vehicular networks.
- Published in:
- Telecommunication Systems, 2013, v. 53, n. 4, p. 425, doi. 10.1007/s11235-013-9706-1
- By:
- Publication type:
- Article
Novel intrusion prediction mechanism based on honeypot log similarity.
- Published in:
- International Journal of Network Management, 2016, v. 26, n. 3, p. 156, doi. 10.1002/nem.1923
- By:
- Publication type:
- Article
Network-coding-based cache policy for loss recovery enhancement in reliable multicast.
- Published in:
- International Journal of Network Management, 2012, v. 22, n. 4, p. 330, doi. 10.1002/nem.808
- By:
- Publication type:
- Article
Improving fairness of TCP Vegas.
- Published in:
- International Journal of Network Management, 2005, v. 15, n. 1, p. 3, doi. 10.1002/nem.534
- By:
- Publication type:
- Article
K-anonymity against neighborhood attacks in weighted social networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3864, doi. 10.1002/sec.1306
- By:
- Publication type:
- Article
Novel distributed key revocation scheme for wireless sensor networks.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 10, p. 1271, doi. 10.1002/sec.707
- By:
- Publication type:
- Article
Digital evidence collection for web image access.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 6, p. 765, doi. 10.1002/sec.610
- By:
- Publication type:
- Article
Improved IPsec performance utilizing transport-layer-aware compression architecture.
- Published in:
- Security & Communication Networks, 2011, v. 4, n. 9, p. 1063, doi. 10.1002/sec.257
- By:
- Publication type:
- Article
Network fair bandwidth share using hash rate estimation.
- Published in:
- Networks, 2002, v. 40, n. 3, p. 125, doi. 10.1002/net.10041
- By:
- Publication type:
- Article
Iterative Key Distribution Based on MAD Neighborhood in Underwater Mobile Sensor Networks.
- Published in:
- Computer Journal, 2012, v. 55, n. 12, p. 1467, doi. 10.1093/comjnl/bxs031
- By:
- Publication type:
- Article
Resource allocation in cloud virtual machines based on empirical service traces.
- Published in:
- International Journal of Communication Systems, 2014, v. 27, n. 12, p. 4210, doi. 10.1002/dac.2607
- By:
- Publication type:
- Article
JPEG forensics scheme for signature embedding and packet-level detection.
- Published in:
- International Journal of Communication Systems, 2014, v. 27, n. 11, p. 3368, doi. 10.1002/dac.2547
- By:
- Publication type:
- Article
A hierarchical mobile-agent-based security operation center.
- Published in:
- International Journal of Communication Systems, 2013, v. 26, n. 12, p. 1503, doi. 10.1002/dac.2323
- By:
- Publication type:
- Article
Distributed key management scheme for peer-to-peer live streaming services.
- Published in:
- International Journal of Communication Systems, 2013, v. 26, n. 10, p. 1259, doi. 10.1002/dac.1394
- By:
- Publication type:
- Article
Minimizing multiplayer interactive delay in multihop wireless networks.
- Published in:
- International Journal of Communication Systems, 2012, v. 25, n. 10, p. 1330, doi. 10.1002/dac.1309
- By:
- Publication type:
- Article
A hidden mutual authentication protocol for low-cost RFID tags.
- Published in:
- International Journal of Communication Systems, 2011, v. 24, n. 9, p. 1196, doi. 10.1002/dac.1222
- By:
- Publication type:
- Article
VoIP secure session assistance and call monitoring via building security gateway.
- Published in:
- International Journal of Communication Systems, 2011, v. 24, n. 7, p. 837, doi. 10.1002/dac.1191
- By:
- Publication type:
- Article
Construct a power-efficient and space-reuse-effective dominating set using small-world model in mobile ad hoc networks.
- Published in:
- International Journal of Communication Systems, 2009, v. 22, n. 11, p. 1445, doi. 10.1002/dac.1041
- By:
- Publication type:
- Article
A fast-convergent fairness scheme for resource allocation in RPR networks.
- Published in:
- International Journal of Communication Systems, 2008, v. 21, n. 7, p. 773, doi. 10.1002/dac.926
- By:
- Publication type:
- Article
Core-stateless fair rate estimation fair queuing.
- Published in:
- International Journal of Communication Systems, 2006, v. 19, n. 6, p. 679, doi. 10.1002/dac.763
- By:
- Publication type:
- Article
A novel core-stateless ABR-like congestion avoidance scheme in IP networks.
- Published in:
- International Journal of Communication Systems, 2005, v. 18, n. 5, p. 427, doi. 10.1002/dac.706
- By:
- Publication type:
- Article
Achieving proportional DiffServ per-hop behaviour with PLQF.
- Published in:
- International Journal of Communication Systems, 2003, v. 16, n. 8, p. 715, doi. 10.1002/dac.614
- By:
- Publication type:
- Article
EVA: a better TCP version for resource-insufficient networks.
- Published in:
- International Journal of Communication Systems, 2002, v. 15, n. 7, p. 593, doi. 10.1002/dac.553
- By:
- Publication type:
- Article
VoWi‐Fi security threats: Address resolution protocol attack and countermeasures.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 2, p. 129, doi. 10.1049/ntw2.12113
- By:
- Publication type:
- Article
Cover Image.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 2, p. i, doi. 10.1049/ntw2.12122
- By:
- Publication type:
- Article
Novel Advanced Broadcast Scheme for Efficient Safety Message Collision Alleviation in Vehicular Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 4, p. 2793, doi. 10.1007/s11277-014-1668-4
- By:
- Publication type:
- Article
Intrusion Detection in IoT Network Traffic Using Markov Model.
- Published in:
- Sensors & Materials, 2024, v. 36, n. 4, Part 1, p. 1127, doi. 10.18494/SAM4713
- By:
- Publication type:
- Article
Cyberattack Defense with Appropriate Address-changing Frequency in Industrial Control Systems.
- Published in:
- Sensors & Materials, 2022, v. 34, n. 7, Part 1, p. 2567, doi. 10.18494/SAM3843
- By:
- Publication type:
- Article
Design of Industrial Control System Secure Communication Using Moving Target Defense with Legacy Infrastructure.
- Published in:
- Sensors & Materials, 2021, v. 33, n. 10, Part 1, p. 3415, doi. 10.18494/SAM.2021.3513
- By:
- Publication type:
- Article
5G-Based Smart Healthcare and Mobile Network Security: Combating Fake Base Stations.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 20, p. 11565, doi. 10.3390/app132011565
- By:
- Publication type:
- Article
A Robust Countermeasures for Poisoning Attacks on Deep Neural Networks of Computer Interaction Systems.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 15, p. 7753, doi. 10.3390/app12157753
- By:
- Publication type:
- Article
A Novel and Efficient Blocking Scheme for Multiple Tag Identifications in a Large Scale RFID System.
- Published in:
- Adhoc & Sensor Wireless Networks, 2020, v. 46, n. 1/2, p. 23
- By:
- Publication type:
- Article