![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Computer Networks, Volume 163
Volume 163, November 2019
- Shuangjuan Li
, Hong Shen
:
Minimizing maximum movement of sensors for line barrier coverage in the plane. - Roberto Massi de Oliveira, Lucas Giroto de Oliveira, Alex Borges Vieira, Moisés Vidal Ribeiro
:
An enhanced cooperative MAC protocol for hybrid PLC/wireless systems. - Edoardo Longo, Alessandro E. C. Redondi
, Matteo Cesana:
Accurate occupancy estimation with WiFi and bluetooth/BLE packet capture. - Amel Arfaoui, Ali Kribeche, Sidi Mohammed Senouci, Mohamed Hamdi:
Game-based adaptive anomaly detection in wireless body area networks. - Saniya Zafar
, Rasheed Hussain
, Fatima Hussain, Sobia Jangsher
:
Interplay between Big Spectrum Data and Mobile Internet of Things: Current solutions and future challenges. - Bala Prakasa Rao Killi
, Seela Veerabhadreswara Rao:
Controller placement in software defined networks: A Comprehensive survey. - Dilara Akdogan, Duygu Karaoglan Altop, Albert Levi
:
Secure key agreement based on ordered biometric features. - Jinting Lin, Lin Cui, Yuxiang Zhang, Fung Po Tso, Quanlong Guan
:
Extensive evaluation on the performance and behaviour of TCP congestion control protocols under varied network scenarios. - Amira Chriki
, Haifa Touati
, Hichem Snoussi, Farouk Kamoun
:
FANET: Communication, mobility models and security issues. - Oscar Arana
, Francisco García
, Javier Gomez
:
Analysis of the effectiveness of transmission power control as a location privacy technique. - Hassan N. Noura
, Reem Melki, Mohammad M. Mansour, Ali Chehab
:
Design and realization of efficient & secure multi-homed systems based on random linear network coding. - Yeonkeun Kim, Jaehyun Nam, Taejune Park, Sandra Scott-Hayward, Seungwon Shin:
SODA: A software-defined security framework for IoT environments. - Mohamed Mostafa M. Fouad
, Ahmed Ibrahem Hafez
, Aboul Ella Hassanien
:
Optimizing topologies in wireless sensor networks: A comparative analysis between the Grey Wolves and the Chicken Swarm Optimization algorithms. - Hassan Jameel Asghar
, Emiliano De Cristofaro, Guillaume Jourjon, Mohamed Ali Kâafar
, Laurent Mathy, Luca Melis, Craig Russell, Mang Yu:
Fast privacy-preserving network function outsourcing. - Mohsen Mahmoudi, Karim Faez
, Abdorasoul Ghasemi
:
Uncoordinated frequency hopping scheme for defense against primary user emulation attack in cognitive radio networks.
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.