NS2 IEEE 2018 PAPERS download

Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless Networks
S.No Code Title Download
1 NSW18(1) A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks
2 NSW18 (2) D2D: Delay-Aware Distributed Dynamic Adaptation of Contention Window in Wireless Networks
3 NSW18 (3) Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks
4 NSW18 (4) Distance-Based Location Management Utilizing Initial Position for Mobile Communication Networks
5 NSW18 (5) Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes
6 NSW18 (6) Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
7 NSW18 (7) Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs
8 NSW18 (8) Resisting Blackhole Attacks on MANETs
9 NSW18 (9) A Kautz-Based Wireless Sensor and Actuator Network for Real- Time, Fault-Tolerant and Energy-Efficient Transmission
10 NSW18(10) CANS: Towards Congestion-Adaptive and Small Stretch Emergency Navigation with Wireless Sensor Networks
11 NSW18(11) Cluster-Based Routing for the Mobile Sink in Wireless Sensor Networks With Obstacles
12 NSW18(12) Code-Based Neighbor Discovery Protocols in Mobile Wireless Networks
13 NSW18(13) DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks
14 NSW18(14) Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
15 NSW18(15) Distributed Emergency Guiding with Evacuation Time Optimization Based on Wireless Sensor Networks
16 NSW18(16) Duplicate Detectable Opportunistic Forwarding in Duty-Cycled Wireless Sensor Networks
17 NSW18(17) Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks
18 NSW18(18) Geographic and Opportunistic Routing for Underwater Sensor Networks
19 NSW18(19) iPath: Path Inference in Wireless Sensor Networks
20 NSW18(20) Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks
21 NSW18(21) Location aware sensor routing protocol for mobile wireless sensor networks
22 NSW18(22) Maximizing Data Collection Throughput on a Path in Energy Harvesting Sensor Networks Using a Mobile Sink
23 NSW18(23) Maximum Data Collection Rate in Rechargeable Wireless Sensor Networks with Multiple Sinks
24 NSW18(24) Mobile Coordinated Wireless Sensor Network: An Energy Efficient Scheme for Real-Time Transmissions
25 NSW18(25) NACRP: A Connectivity Protocol for Star Topology Wireless Sensor Networks
26 NSW18(26) Privacy-Preserving Data Aggregation in Mobile Phone Sensing
27 NSW18(27) RSSI-based Localization through Uncertain Data Mapping for Wireless Sensor Networks
28 NSW18(28) Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks
29 NSW18(29) DTMAC: A Delay Tolerant MAC Protocol for Underwater Wireless Sensor Networks
30 NSW18(30) A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks
31 NSW18(31) Active Trust: Secure and Trustable Routing in Wireless Sensor Networks
32 NSW18(32) Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks
33 NSW18(33) Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing
34 NSW18(34) Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
35 NSW18(35) PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks
36 NSW18(36) Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes
37 NSW18(37) Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs
38 NSW18(38) A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks
39 NSW18(39) A Threshold Anonymous Authentication Protocol for VANETs
40 NSW18(40) ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks
41 NSW18(41) Coalition Formation for Cooperative Service-Based Message Sharing in Vehicular Ad Hoc Networks
42 NSW18(42) Contact-Aware Data Replication in Roadside Unit Aided Vehicular Delay Tolerant Networks
43 NSW18(43) DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion Avoidance
44 NSW18(44) Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks
45 NSW18(45) LORA: Loss Differentiation Rate Adaptation Scheme for Vehicle- to-Vehicle Safety Communications
46 NSW18(46) SCRP: SCRP: Stable CDS-Based Routing Protocol for Urban Vehicular Ad Hoc Networks
47 NSW18(47) Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs
48 NSW18(48) A Hop-by-Hop Routing Mechanism for Green Internet
49 NSW18(49) Achieving Optimal Traffic Engineering Using a Generalized Routing Framework
50 NSW18(50)
51 NSW18(51) Contact Duration Aware Data Replication in DTNs with Licensed and Unlicensed Spectrum
52 NSW18(52) Cost-Aware Caching: Caching More (Costly Items) for Less (ISPs Operational Expenditures)
53 NSW18(53) Design of Scheduling Algorithms for End-to-End Backlog Minimization in Wireless Multi-Hop Networks Under -Hop Interference Models
54 NSW18(54) DSearching: Using Floating Mobility Information for Distributed Node Searching in DTNs
55 NSW18(55) Dynamic Network Control for Confidential Multi-Hop Communications
56 NSW18(56) Embedding IP Unique Shortest Path Topology on a Wavelength- Routed Network: Normal and Survivable Design
57 NSW18(57) Ghost-in-ZigBee: Energy Depletion Attack on ZigBee based Wireless Networks
58 NSW18(58) Improving Access Point Association Protocols Through Channel Utilization and Adaptive Probing
59 NSW18(59) LAAEM: A Method to Enhance LDoS Attack
60 NSW18(60) Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature
61 NSW18(61) PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
62 NSW18(62) Routing Protocol for Heterogeneous Wireless Mesh Networks
63 NSW18(63) Opportunistic Piggyback Marking for IP Traceback
64 NSW18(64) Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme
65 NSW18(65) Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding
66 NSW18(66) Thwarting Selfish Behavior in 802.11 WLANs
67 NSW18(67) Mobility Prediction Based Joint Stable Routing and Channel Assignment for Mobile Ad Hoc Cognitive Networks
68 NSW18(68) Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
69 NSW18(69) Local Anchor Schemes for Seamless and Low-Cost Handover in Coordinated Small Cells
70 NSW18(70) Robotic Message Ferrying for Wireless Networks using Coarse- Grained Backpressure Control
71 NSW18(71) TCP-Aware Back pressure Routing and Scheduling
72 NSW18(72) Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks
Close