All Stories

  1. Proposed method: Mean Delays Synchronization Protocol (MDSP) for Wireless Sensor Networks
  2. 3HA: Hybrid Hole Healing Algorithm in a Wireless Sensor Networks.
  3. DoS-DDoS: TAXONOMIES OF ATTACKS, COUNTERMEASURES, AND WELL-KNOWN DEFENSE MECHANISMS IN CLOUD ENVIRONMENT
  4. SPMI: Single Phase Multiple Initiator Protocol for Coverage in Wireless Sensor Networks
  5. SPMI: Single Phase Multiple Initiator Protocol for Coverage in Wireless Sensor Networks
  6. Increasing QoS Parameters in WSNs through Spiral-Based Clustered Architecture
  7. Kernel methods to detect intruders
  8. Towards Using Games Theory to Detect New U2R Attacks
  9. Distributed Algorithm for Coverage and Connectivity in Wireless Sensor Networks
  10. Maximizing bandwidth in wireless sensor networks using TDMA protocol
  11. BCP: A Border Coverage Protocol for wireless sensor networks
  12. CAC-UA: A Communicating Ant for Clustering to detect unknown attacks
  13. Securing Wireless Sensor Networks: A Survey
  14. Coverage and connectivity protocol for Wireless Sensor Networks
  15. Efficient coverage protocol without location information
  16. A Data Analysis-Based Approach for Detecting Intruders
  17. Critical Study of Supervised Learning Techniques in Predicting Attacks
  18. Modelling intrusion detection as an allocation problem
  19. Efficient deterministic method for detecting new U2R attacks
  20. Critical study of neural networks in detecting intrusions
  21. Improving the Profibus medium access control protocol
  22. Modelling and solving the intrusion detection problem in computer networks
  23. Improving the Timed Token Protocol