no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis
|
Mehtab, Anam |
|
|
25 |
1 |
p. 180-192 |
article |
2 |
A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises
|
Andreolini, Mauro |
|
|
25 |
1 |
p. 236-247 |
article |
3 |
A Market in Dream: the Rapid Development of Anonymous Cybercrime
|
Zhou, Gengqian |
|
|
25 |
1 |
p. 259-270 |
article |
4 |
An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices
|
Ribeiro, José |
|
|
25 |
1 |
p. 164-172 |
article |
5 |
An Auxiliary Antenna Based Inter-User Interference Mitigation Approach in Full-Duplex Wireless Networks
|
Wu, Fei |
|
|
25 |
1 |
p. 16-22 |
article |
6 |
Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic
|
Das, Anjana P. |
|
|
25 |
1 |
p. 55-67 |
article |
7 |
A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration
|
Feng, Bin |
|
|
25 |
1 |
p. 82-94 |
article |
8 |
A Physical-Layer Key Distribution Mechanism for IoT Networks
|
Alhasanat, Mohanad |
|
|
25 |
1 |
p. 173-178 |
article |
9 |
A Physical-Layer Key Distribution Mechanism for IoT Networks
|
Alhasanat, Mohanad |
|
|
25 |
1 |
p. 173-178 |
article |
10 |
Applying Improved Convolutional Neural Network in Image Classification
|
Hu, Zhen-tao |
|
|
25 |
1 |
p. 133-141 |
article |
11 |
Confusing-Keyword Based Secure Search over Encrypted Cloud Data
|
Fu, Zhangjie |
|
|
25 |
1 |
p. 125-132 |
article |
12 |
Consortium Blockchain-Based Secure Software Defined Vehicular Network
|
Zhao, Ning |
|
|
25 |
1 |
p. 314-327 |
article |
13 |
Coordinated Handover Signaling and Cross-Layer Adaptation in Heterogeneous Wireless Networking
|
Al Emam, Fatma A. |
|
|
25 |
1 |
p. 285-299 |
article |
14 |
Correction to: A Physical-Layer Key Distribution Mechanism for IoT Networks
|
Alhasanat, Mohanad |
|
|
25 |
1 |
p. 179 |
article |
15 |
Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm
|
Kantour, Nedjmeddine |
|
|
25 |
1 |
p. 211-222 |
article |
16 |
Disk Cluster Allocation Behavior in Windows and NTFS
|
Karresand, Martin |
|
|
25 |
1 |
p. 248-258 |
article |
17 |
Editorial: Advanced Techniques for Memory Forensics Analysis
|
Lanzi, Andrea |
|
|
25 |
1 |
p. 234-235 |
article |
18 |
Editorial: Physical Layer Security and Wireless Access Control (QSHINE 2017)
|
Wang, Lei |
|
|
25 |
1 |
p. 1-3 |
article |
19 |
Editorial: Reliable Communication for Emerging Wireless Networks
|
Duong, Trung Q. |
|
|
25 |
1 |
p. 271-273 |
article |
20 |
Editorial: Security and Privacy Protection for Mobile Applications and Platforms
|
Sucasas, Victor |
|
|
25 |
1 |
p. 151-152 |
article |
21 |
Enhancing Efficient Link Performance in ZigBee Under Cross-Technology Interference
|
Qin, Zhenquan |
|
|
25 |
1 |
p. 68-81 |
article |
22 |
Full-Duplex Enabled Time-Efficient Device Discovery for Public Safety Communications
|
Kaleem, Zeeshan |
|
|
25 |
1 |
p. 341-349 |
article |
23 |
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks
|
Ramadan, Mohammed |
|
|
25 |
1 |
p. 223-233 |
article |
24 |
Joint Optimization of Latency Monitoring and Traffic Scheduling in Software Defined Heterogeneous Networks
|
Zhang, Xu |
|
|
25 |
1 |
p. 102-113 |
article |
25 |
Joint User Association and Power Allocation for Millimeter-Wave Ultra-Dense Networks
|
Nguyen, H. T. |
|
|
25 |
1 |
p. 274-284 |
article |
26 |
Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions
|
Vo, Van Nhan |
|
|
25 |
1 |
p. 23-41 |
article |
27 |
PBDT: an Energy-Efficient Posture based Data Transmission for Repeated Activities in BAN
|
Maitra, Tanmoy |
|
|
25 |
1 |
p. 328-340 |
article |
28 |
Performance Analysis of Full-Duplex Vehicle-to-Vehicle Relay System over Double-Rayleigh Fading Channels
|
Nguyen, Ba Cao |
|
|
25 |
1 |
p. 363-372 |
article |
29 |
Performance Specifications for the Roll-Off Factor and Filter Order for Filtered Multitone Modulation in the Maritime VHF Data Exchange System
|
Hu, Qing |
|
|
25 |
1 |
p. 142-150 |
article |
30 |
Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers
|
Al-Mistarihi, Mamoun F. |
|
|
25 |
1 |
p. 42-54 |
article |
31 |
Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud
|
Rasool, Saqib |
|
|
25 |
1 |
p. 153-163 |
article |
32 |
Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers
|
Vo, Van Nhan |
|
|
25 |
1 |
p. 193-210 |
article |
33 |
Security and Privacy Issues of UAV: A Survey
|
Zhi, Yueyan |
|
|
25 |
1 |
p. 95-101 |
article |
34 |
Security Performance Analysis of Underlay Cognitive Networks with Helpful Jammer Under Interference from Primary Transmitter
|
Ho-Van, Khuong |
|
|
25 |
1 |
p. 4-15 |
article |
35 |
Topology Optimizing in FSO-based UAVs Relay Networks for Resilience Enhancement
|
Gu, Zhiqun |
|
|
25 |
1 |
p. 350-362 |
article |
36 |
Uplink Resource Allocation for Multi-Cluster Internet-of-Things Deployment Underlaying Cellular Networks
|
ElHalawany, Basem M. |
|
|
25 |
1 |
p. 300-313 |
article |
37 |
WECAN: an Efficient West-East Control Associated Network for Large-Scale SDN Systems
|
Yu, Haisheng |
|
|
25 |
1 |
p. 114-124 |
article |