NS2 IEEE 2019 PAPERS download

Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless Networks
S.No Code Title Download
1 NSW2019(1) A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks
2 NSW2019 (2) D2D: Delay-Aware Distributed Dynamic Adaptation of Contention Window in Wireless Networks
3 NSW2019 (3) Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks
4 NSW2019 (4) Distance-Based Location Management Utilizing Initial Position for Mobile Communication Networks
5 NSW2019 (5) Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes
6 NSW2019 (6) Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
7 NSW2019 (7) Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs
8 NSW2019 (8) Resisting Blackhole Attacks on MANETs
9 NSW2019 (9) A Kautz-Based Wireless Sensor and Actuator Network for Real- Time, Fault-Tolerant and Energy-Efficient Transmission
10 NSW2019(10) CANS: Towards Congestion-Adaptive and Small Stretch Emergency Navigation with Wireless Sensor Networks
11 NSW2019(11) Cluster-Based Routing for the Mobile Sink in Wireless Sensor Networks With Obstacles
12 NSW2019(12) Code-Based Neighbor Discovery Protocols in Mobile Wireless Networks
13 NSW2019(13) DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks
14 NSW2019(14) Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
15 NSW2019(15) Distributed Emergency Guiding with Evacuation Time Optimization Based on Wireless Sensor Networks
16 NSW2019(16) Duplicate Detectable Opportunistic Forwarding in Duty-Cycled Wireless Sensor Networks
17 NSW2019(17) Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks
18 NSW2019(18) Geographic and Opportunistic Routing for Underwater Sensor Networks
19 NSW2019(19) iPath: Path Inference in Wireless Sensor Networks
20 NSW2019(20) Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks
21 NSW2019(21) Location aware sensor routing protocol for mobile wireless sensor networks
22 NSW2019(22) Maximizing Data Collection Throughput on a Path in Energy Harvesting Sensor Networks Using a Mobile Sink
23 NSW2019(23) Maximum Data Collection Rate in Rechargeable Wireless Sensor Networks with Multiple Sinks
24 NSW2019(24) Mobile Coordinated Wireless Sensor Network: An Energy Efficient Scheme for Real-Time Transmissions
25 NSW2019(25) NACRP: A Connectivity Protocol for Star Topology Wireless Sensor Networks
26 NSW2019(26) Privacy-Preserving Data Aggregation in Mobile Phone Sensing
27 NSW2019(27) RSSI-based Localization through Uncertain Data Mapping for Wireless Sensor Networks
28 NSW2019(28) Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks
29 NSW2019(29) DTMAC: A Delay Tolerant MAC Protocol for Underwater Wireless Sensor Networks
30 NSW2019(30) A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks
31 NSW2019(31) Active Trust: Secure and Trustable Routing in Wireless Sensor Networks
32 NSW2019(32) Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks
33 NSW2019(33) Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing
34 NSW2019(34) Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
35 NSW2019(35) PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks
36 NSW2019(36) Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes
37 NSW2019(37) Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs
38 NSW2019(38) A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks
39 NSW2019(39) A Threshold Anonymous Authentication Protocol for VANETs
40 NSW2019(40) ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks
41 NSW2019(41) Coalition Formation for Cooperative Service-Based Message Sharing in Vehicular Ad Hoc Networks
42 NSW2019(42) Contact-Aware Data Replication in Roadside Unit Aided Vehicular Delay Tolerant Networks
43 NSW2019(43) DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion Avoidance
44 NSW2019(44) Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks
45 NSW2019(45) LORA: Loss Differentiation Rate Adaptation Scheme for Vehicle- to-Vehicle Safety Communications
46 NSW2019(46) SCRP: SCRP: Stable CDS-Based Routing Protocol for Urban Vehicular Ad Hoc Networks
47 NSW2019(47) Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs
48 NSW2019(48) A Hop-by-Hop Routing Mechanism for Green Internet
49 NSW2019(49) Achieving Optimal Traffic Engineering Using a Generalized Routing Framework
50 NSW2019(50)
51 NSW2019(51) Contact Duration Aware Data Replication in DTNs with Licensed and Unlicensed Spectrum
52 NSW2019(52) Cost-Aware Caching: Caching More (Costly Items) for Less (ISPs Operational Expenditures)
53 NSW2019(53) Design of Scheduling Algorithms for End-to-End Backlog Minimization in Wireless Multi-Hop Networks Under -Hop Interference Models
54 NSW2019(54) DSearching: Using Floating Mobility Information for Distributed Node Searching in DTNs
55 NSW2019(55) Dynamic Network Control for Confidential Multi-Hop Communications
56 NSW2019(56) Embedding IP Unique Shortest Path Topology on a Wavelength- Routed Network: Normal and Survivable Design
57 NSW2019(57) Ghost-in-ZigBee: Energy Depletion Attack on ZigBee based Wireless Networks
58 NSW2019(58) Improving Access Point Association Protocols Through Channel Utilization and Adaptive Probing
59 NSW2019(59) LAAEM: A Method to Enhance LDoS Attack
60 NSW2019(60) Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature
61 NSW2019(61) PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
62 NSW2019(62) Routing Protocol for Heterogeneous Wireless Mesh Networks
63 NSW2019(63) Opportunistic Piggyback Marking for IP Traceback
64 NSW2019(64) Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme
65 NSW2019(65) Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding
66 NSW2019(66) Thwarting Selfish Behavior in 802.11 WLANs
67 NSW2019(67) Mobility Prediction Based Joint Stable Routing and Channel Assignment for Mobile Ad Hoc Cognitive Networks
68 NSW2019(68) Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
69 NSW2019(69) Local Anchor Schemes for Seamless and Low-Cost Handover in Coordinated Small Cells
70 NSW2019(70) Robotic Message Ferrying for Wireless Networks using Coarse- Grained Backpressure Control
71 NSW2019(71) TCP-Aware Back pressure Routing and Scheduling
72 NSW2019(72) Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks
Close