NS2 IEEE 2018 PAPERS download

Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless Networks
S.No Code Title Download
1 NSW2018(1) A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks
2 NSW2018 (2) D2D: Delay-Aware Distributed Dynamic Adaptation of Contention Window in Wireless Networks
3 NSW2018 (3) Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks
4 NSW2018 (4) Distance-Based Location Management Utilizing Initial Position for Mobile Communication Networks
5 NSW2018 (5) Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes
6 NSW2018 (6) Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
7 NSW2018 (7) Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs
8 NSW2018 (8) Resisting Blackhole Attacks on MANETs
9 NSW2018 (9) A Kautz-Based Wireless Sensor and Actuator Network for Real- Time, Fault-Tolerant and Energy-Efficient Transmission
10 NSW2018(10) CANS: Towards Congestion-Adaptive and Small Stretch Emergency Navigation with Wireless Sensor Networks
11 NSW2018(11) Cluster-Based Routing for the Mobile Sink in Wireless Sensor Networks With Obstacles
12 NSW2018(12) Code-Based Neighbor Discovery Protocols in Mobile Wireless Networks
13 NSW2018(13) DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks
14 NSW2018(14) Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
15 NSW2018(15) Distributed Emergency Guiding with Evacuation Time Optimization Based on Wireless Sensor Networks
16 NSW2018(16) Duplicate Detectable Opportunistic Forwarding in Duty-Cycled Wireless Sensor Networks
17 NSW2018(17) Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks
18 NSW2018(18) Geographic and Opportunistic Routing for Underwater Sensor Networks
19 NSW2018(19) iPath: Path Inference in Wireless Sensor Networks
20 NSW2018(20) Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks
21 NSW2018(21) Location aware sensor routing protocol for mobile wireless sensor networks
22 NSW2018(22) Maximizing Data Collection Throughput on a Path in Energy Harvesting Sensor Networks Using a Mobile Sink
23 NSW2018(23) Maximum Data Collection Rate in Rechargeable Wireless Sensor Networks with Multiple Sinks
24 NSW2018(24) Mobile Coordinated Wireless Sensor Network: An Energy Efficient Scheme for Real-Time Transmissions
25 NSW2018(25) NACRP: A Connectivity Protocol for Star Topology Wireless Sensor Networks
26 NSW2018(26) Privacy-Preserving Data Aggregation in Mobile Phone Sensing
27 NSW2018(27) RSSI-based Localization through Uncertain Data Mapping for Wireless Sensor Networks
28 NSW2018(28) Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks
29 NSW2018(29) DTMAC: A Delay Tolerant MAC Protocol for Underwater Wireless Sensor Networks
30 NSW2018(30) A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks
31 NSW2018(31) Active Trust: Secure and Trustable Routing in Wireless Sensor Networks
32 NSW2018(32) Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks
33 NSW2018(33) Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing
34 NSW2018(34) Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
35 NSW2018(35) PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks
36 NSW2018(36) Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes
37 NSW2018(37) Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs
38 NSW2018(38) A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks
39 NSW2018(39) A Threshold Anonymous Authentication Protocol for VANETs
40 NSW2018(40) ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks
41 NSW2018(41) Coalition Formation for Cooperative Service-Based Message Sharing in Vehicular Ad Hoc Networks
42 NSW2018(42) Contact-Aware Data Replication in Roadside Unit Aided Vehicular Delay Tolerant Networks
43 NSW2018(43) DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion Avoidance
44 NSW2018(44) Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks
45 NSW2018(45) LORA: Loss Differentiation Rate Adaptation Scheme for Vehicle- to-Vehicle Safety Communications
46 NSW2018(46) SCRP: SCRP: Stable CDS-Based Routing Protocol for Urban Vehicular Ad Hoc Networks
47 NSW2018(47) Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs
48 NSW2018(48) A Hop-by-Hop Routing Mechanism for Green Internet
49 NSW2018(49) Achieving Optimal Traffic Engineering Using a Generalized Routing Framework
50 NSW2018(50)
51 NSW2018(51) Contact Duration Aware Data Replication in DTNs with Licensed and Unlicensed Spectrum
52 NSW2018(52) Cost-Aware Caching: Caching More (Costly Items) for Less (ISPs Operational Expenditures)
53 NSW2018(53) Design of Scheduling Algorithms for End-to-End Backlog Minimization in Wireless Multi-Hop Networks Under -Hop Interference Models
54 NSW2018(54) DSearching: Using Floating Mobility Information for Distributed Node Searching in DTNs
55 NSW2018(55) Dynamic Network Control for Confidential Multi-Hop Communications
56 NSW2018(56) Embedding IP Unique Shortest Path Topology on a Wavelength- Routed Network: Normal and Survivable Design
57 NSW2018(57) Ghost-in-ZigBee: Energy Depletion Attack on ZigBee based Wireless Networks
58 NSW2018(58) Improving Access Point Association Protocols Through Channel Utilization and Adaptive Probing
59 NSW2018(59) LAAEM: A Method to Enhance LDoS Attack
60 NSW2018(60) Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature
61 NSW2018(61) PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
62 NSW2018(62) Routing Protocol for Heterogeneous Wireless Mesh Networks
63 NSW2018(63) Opportunistic Piggyback Marking for IP Traceback
64 NSW2018(64) Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme
65 NSW2018(65) Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding
66 NSW2018(66) Thwarting Selfish Behavior in 802.11 WLANs
67 NSW2018(67) Mobility Prediction Based Joint Stable Routing and Channel Assignment for Mobile Ad Hoc Cognitive Networks
68 NSW2018(68) Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
69 NSW2018(69) Local Anchor Schemes for Seamless and Low-Cost Handover in Coordinated Small Cells
70 NSW2018(70) Robotic Message Ferrying for Wireless Networks using Coarse- Grained Backpressure Control
71 NSW2018(71) TCP-Aware Back pressure Routing and Scheduling
72 NSW2018(72) Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks
Close