All Stories

  1. How AGI Can Solve Service Explosion in the Internet of Everything
  2. A survey of malware analysis using community detection algorithms
  3. Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends
  4. Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user’s connectivity experience
  5. Secure transfer of environmental data to enhance human decision accuracy
  6. Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society
  7. Preventive Policy Enforcement with Minimum User Intervention Against SMS Malware in Android Devices
  8. Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink
  9. Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks
  10. Intertwined path formation and MAC scheduling for fast delivery of aggregated data in WSN
  11. Low delay and secure M2M communication mechanism for eHealthcare
  12. Third line of defense strategy to fight against SMS-based malware in android smartphones
  13. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems
  14. Spam Trapping System: Novel security framework to fight against spam botnets
  15. Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: Solutions and Challenges
  16. SMART: Secure Multi-pAths Routing for wireless sensor neTworks
  17. DZ50: Energy-efficient Wireless Sensor Mote Platform for Low Data Rate Applications
  18. Half-Symmetric Lens based localization algorithm for wireless sensor networks
  19. MOB-TOSSIM: An Extension Framework for TOSSIM Simulator to Support Mobility in Wireless Sensor and Actuator Networks
  20. Semi-structured and unstructured data aggregation scheduling in wireless sensor networks
  21. Distributed algorithm for the actor coverage problem in WSN-based precision irrigation applications
  22. A resource-based mutual exclusion algorithm supporting dynamic acting range and mobility for Wireless sensor and Actor Networks
  23. A Comparison on MANETs’ Service Replication Schemes: Interest versus Topology Prediction
  24. Efficient Monitoring Mechanisms for Cooperative Storage in Mobile Ad-Hoc Networks: Detection Time and Accuracy Tradeoffs
  25. Data replication protocols for mobile ad-hoc networks: a survey and taxonomy
  26. Balancing the tradeoffs between scalability and availability in mobile ad hoc networks with a flat hashing-based location service
  27. A Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks
  28. Self-stabilizing algorithm for high service availability in spite of concurrent topology changes in ad hoc mobile networks
  29. A distributed mutual exclusion algorithm over multi-routing protocol for mobilead hocnetworks
  30. SQUIRREL: Self-Organizing Qos-roUting for IntRa-flow Contention in Ad-Hoc wiRELess Networks
  31. Low-Cost and Accurate Intra-flow Contention-Based Admission Control for IEEE 802.11 Ad Hoc Networks
  32. Admission Control Scheme and Bandwidth Management Protocol for 802.11 Ad hoc Networks
  33. Enabling ad-hoc collaboration between mobile users in the $\mathcal{MESSENGER}$ project
  34. A pull-based service replication protocol in mobile ad hoc networks
  35. Localized Hybrid Data Delivery Scheme using K-hop Clustering Algorithm in Ad Hoc Networks
  36. On Promoting Ad-Hoc Collaboration Among Messengers
  37. Ad-Hoc Collaboration Between Messengers: Operations and Incentives
  38. ELS: Energy-Aware Some-for-Some Location Service for Ad Hoc Mobile Networks
  39. A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks
  40. Les Protocoles de routage dans les réseaux mobiles Ad Hoc
  41. Mobility impact on mobile ad hoc routing protocols