default search action
Journal of Network and Computer Applications, Volume 132
Volume 132, April 2019
- Jinyoung Han, Daejin Choi, Taejoong Chung, Chen-Nee Chuah, Hyunchul Kim, Ted Taekyoung Kwon:
Predicting content consumption from content-to-content relationships. 1-9 - Preetha Thulasiraman, Thomas Haakensen, Audrey F. Callanan:
Countering passive cyber attacks against sink nodes in tactical sensor networks using reactive route obfuscation. 10-21 - Ruan Delgado Gomes, César Benavente-Peces, Iguatemi E. Fonseca, Marcelo S. Alencar:
Adaptive and Beacon-based multi-channel protocol for Industrial Wireless Sensor Networks. 22-39 - Wenyuan Han, Weijiang Liu, Kaiye Zhang, Zhiyang Li, Zhaobin Liu:
A protocol for detecting missing target tags in RFID systems. 40-48 - Sharleen Joy Y. Go, Cedric Angelo M. Festin, Wilson M. Tan:
An SDN-based framework for improving the performance of underprovisioned IP Video Surveillance networks. 49-74 - (Withdrawn) Flow online identification method for the encrypted Skype. 75-85
- Xiangjie Kong, Yajie Shi, Shuo Yu, Jiaying Liu, Feng Xia:
Academic social networks: Modeling, analysis, mining and applications. 86-103 - Nouman Ashraf, Muhammad Faizan Ghuman, Waqar Asif, Hassaan Khaliq Qureshi, Adnan Iqbal, Marios Lestas:
Energy management in harvesting enabled sensing nodes: Prediction and control. 104-117 - (Withdrawn) Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey. 118-148
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.