Search
Products meeting the search criteria
Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution
Digital video sometimes needs to be stored and processed in an encrypted format to maintain security..
Data-Core-Based Fuzzy Min–Max Neural Network for Pattern Classification
A fuzzy min–max neural network based on data core (DCFMN) is proposed for pattern classification. A ..
Deafeating sql Queries
SQL is the standard language for accessing database servers, including MySQL, Oracle, and SQL Serve..
Decentralized robust spectrum allocation for cognitive radio wireless mesh networks
Wireless Sensor Networks (WSNs) have emerged as research areas with an overwhelming effect on practi..
Defending Against Collaborative Attacks by Malicious Nodes in MANETs A Cooperative Bait Detection Approach
Wireless networks are computer networks that are not connected by cables of any kind. The use of wir..
Defense Against SSDF Attack in Cognitive Radio Networks Attack Aware Collaborative Spectrum Sensing Approach
Spectrum Sensing Data Falsifiaction (SSDF) attacks are detected in cognitive radio Networks. In this..
Delay-Constrained-Caching-in-Cognitive-Radio-Networks
In cognitive radio networks, unlicensed users can use under-utilized licensed spectrum to achieve su..
Design and Evaluation of the Optimal Cache Allocation for Content-Centric Networking
Content-Centric Networking is a new communication architecture that rethinks the Internet communicat..
Detecting and Resolving Firewall Policy Anomalies
Firewalls have an important role in network security. However, managing firewall policies is an extr..
DETECTING STRESS BASED ON SOCIAL INTERACTIONS IN SOCIAL NETWORKS
Psychological stress is threatening people’s health. It is non-trivial to detect stress timely for p..
Detection and prevention of wormhole attack in manet
The development in wireless technologies and the high availability of wireless equipment in everyday..
Device-to-device communications for enhancing quality of experience in software defined multi-tier LTE-A networks
Self-organizing network, or SON, technology, which is able to minimize human intervention in network..
Discovering Mobile Applications in Cellular Device to Device Communications Hash Function and Bloom Filter Based Approach
It is important to ensure an efficient data transfer between the nodes in wireless communication. In..
Discovering the Top-kUnexplained Sequences in Time-Stamped Observation Data
There are several applications where demand to determine unexpected activities in a sequence of tim..
Distributed Opportunistic Scheduling for EnergyHarvesting Based Wireless Networks A Two-StageProbing Approach
Real-time network applications depend on schedulers to guarantee the quality of service (QoS). Conve..