Network Projects
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
We concentrate on this point and study the minimum number of infrastructure nodes that need to be ad..
Coverage Contribution Area based k-Coverage for Wireless Sensor Networks
Coverage is a primary metric for ensuring the quality of services (QoSs) provided by a wireless sen..
CROSS-DOMAIN PRIVACY-PRESERVING COOPERATIVE FIREWALL OPTIMIZATION
ABSTRACT Firewalls have been widely deployed on the Internet for securing private networks. A fi..
CRYPTO-LESS OVER-THE-AIR KEY ESTABLISHMENT
ABSTRACT In this paper, we present a novel pr..
Customizable-Point-of-Interest-Queries-in-Road-Networks
Networking plays a crucial role in Cloud computing. Users access Cloud services through computer net..
Data Collection Maximization in Renewable Sensor Networks via Time-Slot Scheduling
Wireless Sensor Networks (WSNs) are used in many applications in military, ecological, and health-re..
Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution
Digital video sometimes needs to be stored and processed in an encrypted format to maintain security..
Data-Core-Based Fuzzy Min–Max Neural Network for Pattern Classification
A fuzzy min–max neural network based on data core (DCFMN) is proposed for pattern classification. A ..
Deafeating sql Queries
SQL is the standard language for accessing database servers, including MySQL, Oracle, and SQL Serve..
Decentralized Access Control with AnonymousAuthentication of Data Stored in Clouds
A new decentralized access control scheme for secure data storage in clouds that supports anonymous ..
Decentralized robust spectrum allocation for cognitive radio wireless mesh networks
Wireless Sensor Networks (WSNs) have emerged as research areas with an overwhelming effect on practi..
DECISION MAKING SCHEME TO ENSURE POWER AND RESOURCE USAGE FOR SERVICE PROVIDERS
Many cloud service providers face problems due to VM migration in the clustered server. Due to over ..
Defending Against Collaborative Attacks by Malicious Nodes in MANETs A Cooperative Bait Detection Approach
Wireless networks are computer networks that are not connected by cables of any kind. The use of wir..
Defending Against Collaborative Attacks by Malicious Nodes in MANETs A Cooperative Bait Detection Approach
• It has an two process they are reactive and proactive. • These process are performed to transferr..
Defense Against SSDF Attack in Cognitive Radio Networks Attack Aware Collaborative Spectrum Sensing Approach
Spectrum Sensing Data Falsifiaction (SSDF) attacks are detected in cognitive radio Networks. In this..