-
1
-
-
79953778099
-
Home M2M Networks: Architectures, Standards, and QoS Improvement
-
Apr
-
Y. Zhang et al., “Home M2M Networks: Architectures, Standards, and QoS Improvement,” IEEE Commun. Mag., vol. 49, no. 4, Apr. 2011, pp. 44–52.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 44-52
-
-
Zhang, Y.1
-
2
-
-
84861317311
-
Cognitive Machine-to-Machine Communications: Visions and Potentials for the Smart Grid
-
June
-
Y. Zhang et al., “Cognitive Machine-to-Machine Communications: Visions and Potentials for the Smart Grid,” IEEE Network, vol. 26, no. 3, June 2012, pp. 6–13.
-
(2012)
IEEE Network
, vol.26
, Issue.3
, pp. 6-13
-
-
Zhang, Y.1
-
3
-
-
84859977808
-
A Trust-Based Mechanism for Protecting IPv6 Networks Against Stateless Address Auto-Configuration Attacks
-
Dec
-
Z. Baig and S. Adeniye, “A Trust-Based Mechanism for Protecting IPv6 Networks Against Stateless Address Auto-Configuration Attacks,” Proc. IEEE. 17th Int’l. Conf. Net., Dec. 2011, pp. 171–76.
-
(2011)
Proc. IEEE. 17th Int’L. Conf. Net.
, pp. 171-176
-
-
Baig, Z.1
Adeniye, S.2
-
4
-
-
84969940808
-
Security in Software Defined Networks: A Survey
-
Aug
-
I. Ahmad et al., “Security in Software Defined Networks: A Survey,” IEEE Commun. Surveys & Tutorials, vol. 17, no. 4, Aug. 2015, pp. 2317–46.
-
(2015)
IEEE Commun. Surveys & Tutorials
, vol.17
, Issue.4
, pp. 2317-2346
-
-
Ahmad, I.1
-
5
-
-
84962815572
-
Internet of Things (IoT) Digital Forensic Investigation Model: Top-Down Forensic Approach Methodology
-
Oct
-
S. Perumal, N. Norwawi, and V. Raman, “Internet of Things (IoT) Digital Forensic Investigation Model: Top-Down Forensic Approach Methodology” Proc. IEEE ICDIPC, Oct. 2015, pp. 19–23.
-
(2015)
Proc. IEEE ICDIPC
, pp. 19-23
-
-
Perumal, S.1
Norwawi, N.2
Raman, V.3
-
6
-
-
84903531892
-
Anomaly Extraction in Backbone Networks Using Association Rules
-
Feb
-
D. Brauckhoff et al., “Anomaly Extraction in Backbone Networks Using Association Rules,” IEEE/ACM Trans. Net., vol. 20, no. 6, Feb. 2014, pp. 1788–99.
-
(2014)
IEEE/ACM Trans. Net.
, vol.20
, Issue.6
, pp. 1788-1799
-
-
Brauckhoff, D.1
-
7
-
-
84871763598
-
Network Forensics: An Analysis of Techniques, Tools, and Trends
-
July
-
R. Hunt and S. Zeadally, “Network Forensics: An Analysis of Techniques, Tools, and Trends,” Computer, vol. 45, no. 12, July 2012, pp. 36-43.
-
(2012)
Computer
, vol.45
, Issue.12
, pp. 36-43
-
-
Hunt, R.1
Zeadally, S.2
-
8
-
-
84857369317
-
MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
-
Feb
-
S. Raza et al., “MeasuRouting: A Framework for Routing Assisted Traffic Monitoring,” IEEE/ACM Trans. Net., vol. 20, no. 1, Feb. 2012, pp. 45–56.
-
(2012)
IEEE/ACM Trans. Net.
, vol.20
, Issue.1
, pp. 45-56
-
-
Raza, S.1
-
9
-
-
84855923041
-
Secure Communication in Stochastic Wireless Networks-Part I: Connectivity
-
Jan
-
P. Pinto, J. Barros, and M. Win, “Secure Communication in Stochastic Wireless Networks-Part I: Connectivity,” IEEE Trans. Info. Forensics Security, vol. 7, no. 1, Jan. 2012, pp. 125–38.
-
(2012)
IEEE Trans. Info. Forensics Security
, vol.7
, Issue.1
, pp. 125-138
-
-
Pinto, P.1
Barros, J.2
Win, M.3
-
10
-
-
84856480462
-
Multimedia in Forensics, Security, and Intelligence
-
Jan
-
S. Battiato et al., “Multimedia in Forensics, Security, and Intelligence,” IEEE MultiMedia, vol. 19, no. 1, Jan. 2012, pp. 17–19.
-
(2012)
IEEE MultiMedia
, vol.19
, Issue.1
, pp. 17-19
-
-
Battiato, S.1
-
11
-
-
84940688354
-
A First Step Toward Network Security Virtualization: From Concept to Prototype
-
Oct
-
S. Shin, H. Wang, and G. Gu, “A First Step Toward Network Security Virtualization: From Concept to Prototype,” IEEE Trans. Info. Forensics Security, vol. 10, no. 10, Oct. 2015, pp. 2236–49.
-
(2015)
IEEE Trans. Info. Forensics Security
, vol.10
, Issue.10
, pp. 2236-2249
-
-
Shin, S.1
Wang, H.2
Gu, G.3
-
12
-
-
79958778609
-
Dirichlet-based Trust Management for Effective Collaborative Intrusion Detection Networks
-
June
-
C. Fung et al., “Dirichlet-based Trust Management for Effective Collaborative Intrusion Detection Networks,” IEEE Trans. Net. Service Mgmt., vol. 8, no. 2, June 2011, pp. 79–91.
-
(2011)
IEEE Trans. Net. Service Mgmt.
, vol.8
, Issue.2
, pp. 79-91
-
-
Fung, C.1
-
13
-
-
84905736269
-
A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks
-
Sept
-
H. Moosavi and F. Bui, “A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks,” IEEE Trans. Info. Forensics Security, vol. 9, no. 9, Sept. 2014, pp. 1367–79.
-
(2014)
IEEE Trans. Info. Forensics Security
, vol.9
, Issue.9
, pp. 1367-1379
-
-
Moosavi, H.1
Bui, F.2
-
14
-
-
84962034263
-
Mobile big Data Fault-Tolerant Processing for eHealth Networks
-
Jan
-
K. Wang et al., “Mobile big Data Fault-Tolerant Processing for eHealth Networks,” IEEE Network, vol. 30, no. 1, Jan. 2016, pp. 1–7.
-
(2016)
IEEE Network
, vol.30
, Issue.1
, pp. 1-7
-
-
Wang, K.1
-
15
-
-
84921479434
-
LDPA: A Local Data Processing Architecture in Ambient Assisted Living Communications
-
Jan
-
K. Wang et al., “LDPA: A Local Data Processing Architecture in Ambient Assisted Living Communications,” IEEE Commun. Mag., vol. 53, no. 1, Jan. 2015, pp. 56–63.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.1
, pp. 56-63
-
-
Wang, K.1
|