Hi there! Click one of our representatives below and we will get back to you as soon as possible.

Wireless-NS2

star_border star_border star_border star_border star_border

SecureMAC Securing Wireless Medium Access Control Against Insider Denial of Service Attacks

Wireless network dynamically allocates channel resources to improve spectral efficiency and, to avoi..

3,500.00INR
star_border star_border star_border star_border star_border

Securing the Backpressure Algorithm for Wireless Networks

The backpressure algorithm is known to provide throughput optimality in routing and scheduling decis..

3,500.00INR
star_border star_border star_border star_border star_border

SIR a secure and intelligent routing protocol for vehicular ad hocnetwork

: Security in routing is an important issue in vehicular ad hoc network (VANET) to protect the valua..

3,500.00INR
star_border star_border star_border star_border star_border

Spectrum Aware Anypath Routing in Multi Hop Cognitive Radio Networks

Cognitive radio networks (CRNs) have been emerging as a promising technique to improve the spectrum ..

3,500.00INR
star_border star_border star_border star_border star_border

Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing

Sensing falsification is a key security threat in cooperative spectrum sensing in cognitive radio ne..

3,500.00INR
star_border star_border star_border star_border star_border

Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks

We address how to design a distributed movement strategy for mobile collectors, which can be eithe..

4,500.00INR
star_border star_border star_border star_border star_border

Traffic De correlation Techniques for Countering a Global Eavesdropper in WSNs

We address the problem of preventing the inference of contextual information in event-driven wireles..

3,500.00INR
star_border star_border star_border star_border star_border

Trust Management for Vehicular Networks An Adversary-Oriented Overview

Cooperative Intelligent Transportation Systems, mainly represented by vehicular ad hoc networks (VAN..

3,500.00INR
star_border star_border star_border star_border star_border

Uplink Energy-Delay Trade-Off under Optimized Relay Placement in Cellular Networks

Relay nodes-enhanced architectures are deemed a viable solution to enhance coverage and capacity o..

4,500.00INR
star_border star_border star_border star_border star_border

Uplink Energy-Efficient Load Balancing Over Multipath Wireless Networks

This letter studies the case of multi-interface mobile devices transmitting video traffic over mul..

4,500.00INR
star_border star_border star_border star_border star_border

Vulnerable Concealed Map Reading Inside Mobile Ad Hoc Networks

— Number of techniques has been used based on packet encryption to protect the data forwarding in M..

3,500.00INR
star_border star_border star_border star_border star_border

Vulnerable Concealed Map-Reading Inside Mobile Ad Hoc Networks

Number of techniques has been used based on packet encryption to protect the data forwarding in MAN..

4,500.00INR
Showing 151 to 162 of 162 (11 Pages)
Free Website Hit Counter
Free website hit counter