24.1.9 Network Analysis, Wireless, Network Intrusion

Chapter Contents (Back)
Networks. See also Sensor Networks.

Xing, D.S.[Dong-Shan], Girolami, M.A.[Mark A.],
Employing Latent Dirichlet Allocation for fraud detection in telecommunications,
PRL(28), No. 13, 1 October 2007, pp. 1727-1734.
Elsevier DOI 0709
Fraud detection; Telecommunications; User modelling; Data mining; Latent Dirichlet Allocation BibRef

Celikoglu, H.B., Gedizlioglu, E., Dell'Orco, M.,
A Node-Based Modeling Approach for the Continuous Dynamic Network Loading Problem,
ITS(10), No. 1, March 2009, pp. 165-174.
IEEE DOI 0903
BibRef

Beghdad, R.[Rachid],
Modelling intrusion detection as an allocation problem,
PRL(30), No. 8, 1 June 2009, pp. 774-779.
Elsevier DOI 0905
Allocation problem; Attacks database; Modelling attack classes; Misuse detection; Simulation tool BibRef

Thinh, T.N.[Tran Ngoc], Kittitornkun, S.[Surin], Tomiyama, S.[Shigenori],
PAMELA: Pattern Matching Engine with Limited-Time Update for NIDS/NIPS,
IEICE(E92-D), No. 5, May 2009, pp. 1049-1061.
WWW Link. 0907
Network intrusion detection, intrusion prevention. BibRef

Srivastav, A.[Abhishek], Ray, A.[Asok],
Self-organization of sensor networks for detection of pervasive faults,
SIViP(4), No. 1, March 2010, pp. xx-yy.
Springer DOI 1003
BibRef

Tavallaee, M., Stakhanova, N., Ghorbani, A.A.,
Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods,
SMC-C(40), No. 5, September 2010, pp. 516-524.
IEEE DOI 1008
BibRef

Kim, K.J., Tsiftsis, T.A.,
Performance Analysis of Cyclically Prefixed Single-Carrier Transmissions With Outdated Opportunistic User Selection,
SPLetters(17), No. 10, October 2010, pp. 847-850.
IEEE DOI 1008
Transmission issues. BibRef

Taysi, Z.C., Yavuz, A.G.,
Routing Protocols for GeoNet: A Survey,
ITS(13), No. 2, June 2012, pp. 939-954.
IEEE DOI 1206
BibRef

Huang, Y.C.[Yi-Chao], Rao, B.D.,
Sum Rate Analysis of One-Pico-Inside OFDMA Network With Opportunistic Scheduling and Selective Feedback,
SPLetters(19), No. 7, July 2012, pp. 383-386.
IEEE DOI 1206
BibRef

Nguyen, H.X., Roughan, M.,
Improving Hidden Markov Model Inferences With Private Data From Multiple Observers,
SPLetters(19), No. 10, October 2012, pp. 696-699.
IEEE DOI 1209
BibRef

Shames, I., Teixeira, A.M.H., Sandberg, H., Johansson, K.H.,
Fault Detection and Mitigation in Kirchhoff Networks,
SPLetters(19), No. 11, November 2012, pp. 749-752.
IEEE DOI 1210
BibRef

Krishnamurthy, V., Hoiles, W.,
Afriat's Test for Detecting Malicious Agents,
SPLetters(19), No. 12, December 2012, pp. 801-804.
IEEE DOI 1212
BibRef

Li, Y., Jin, D., Wang, Z., Zeng, L., Chen, S.,
Exponential and Power Law Distribution of Contact Duration in Urban Vehicular Ad Hoc Networks,
SPLetters(20), No. 1, January 2013, pp. 110-113.
IEEE DOI 1212
BibRef

Li, Y.[Yong], Jin, D.[Depeng], Hui, P.[Pan], Wang, Z.C.[Zhao-Cheng], Chen, S.[Sheng],
Limits of Predictability for Large-Scale Urban Vehicular Mobility,
ITS(15), No. 6, December 2014, pp. 2671-2682.
IEEE DOI 1412
mobility management (mobile radio) BibRef

Wang, C., Li, Y.[Yong], Jin, D.[Depeng], Chen, S.[Sheng],
On the Serviceability of Mobile Vehicular Cloudlets in a Large-Scale Urban Environment,
ITS(17), No. 10, October 2016, pp. 2960-2970.
IEEE DOI 1610
Cloud computing BibRef

Romero-Zurita, N., McLernon, D., Ghogho, M., Swami, A.,
PHY Layer Security Based on Protected Zone and Artificial Noise,
SPLetters(20), No. 5, May 2013, pp. 487-490.
IEEE DOI 1304
BibRef

Khademi, S., van der Veen, A.J.,
Constant Modulus Algorithm for Peak-to-Average Power Ratio (PAPR) Reduction in MIMO OFDM/A,
SPLetters(20), No. 5, May 2013, pp. 531-534.
IEEE DOI 1304
BibRef

Chandrasekaran, S.[Srimathi], Vaideeswaran, J.,
Meta-scheduler using agents for fault tolerance in computational grid,
IJCVR(4), No. 4, 2014, pp. 294-329.
DOI Link 1411
BibRef

Shen, Y.[Yun], Liu, Y.T.[Yi-Tong], Liu, J.[Jing], Yang, H.W.[Hong-Wen], Yang, D.C.[Da-Cheng],
A Novel Structure of HTTP Adaptive Streaming Based on Unequal Error Protection Rateless Code,
IEICE(E97-D), No. 11, November 2014, pp. 2903-2911.
WWW Link. 1412
BibRef

Bhuyan, M.H.[Monowar H.], Bhattacharyya, D.K., Kalita, J.K.,
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection,
PRL(51), No. 1, 2015, pp. 1-7.
Elsevier DOI 1412
DDoS attack BibRef

Fu, B.[Bo], Xiao, Y.[Yang], Liang, X.N.[Xian-Nuan], Chen, C.L.P.,
Bio-inspired Group Modeling and Analysis for Intruder Detection in Mobile Sensor/Robotic Networks,
Cyber(45), No. 1, January 2015, pp. 103-115.
IEEE DOI 1502
mobile robots BibRef

Hui, H.[Hui], Swindlehurst, A.L., Li, G.B.[Guo-Bing], Liang, J.L.[Jun-Li],
Secure Relay and Jammer Selection for Physical Layer Security,
SPLetters(22), No. 8, August 2015, pp. 1147-1151.
IEEE DOI 1502
error statistics BibRef

Meng, X.M.[Xiang-Ming], Wu, S.[Sheng], Kuang, L.L.[Lin-Ling], Lu, J.H.[Jian-Hua],
An Expectation Propagation Perspective on Approximate Message Passing,
SPLetters(22), No. 8, August 2015, pp. 1194-1197.
IEEE DOI 1502
approximation theory BibRef

Rawat, D.B., Bajracharya, C.,
Detection of False Data Injection Attacks in Smart Grid Communication Systems,
SPLetters(22), No. 10, October 2015, pp. 1652-1656.
IEEE DOI 1506
Kalman filters BibRef

Rastegarnia, A.[Amir], Khalili, A.[Azam], Bazzi, W.M.[Wael M.], Sanei, S.[Saeid],
An incremental LMS network with reduced communication delay,
SIViP(10), No. 4, April 2016, pp. 769-775.
Springer DOI 1604
BibRef

Brandt, R., Mochaourab, R., Bengtsson, M.,
Globally Optimal Base Station Clustering in Interference Alignment-Based Multicell Networks,
SPLetters(23), No. 4, April 2016, pp. 512-516.
IEEE DOI 1604
Base stations BibRef

Jo, H.G.[Hyeong Gon], Son, T.Y.[Tae Yong], Jeong, S.Y.[Seol Young], Kang, S.J.[Soon Ju],
Proximity-Based Asynchronous Messaging Platform for Location-Based Internet of Things Service,
IJGI(5), No. 7, 2016, pp. 116.
DOI Link 1608
BibRef

Chen, X.F.[Xiao-Fan], Yu, S.Z.[Shun-Zheng],
A Collaborative Intrusion Detection System against DDoS for SDN,
IEICE(E99-D), No. 9, September 2016, pp. 2395-2399.
WWW Link. 1609
BibRef

Utkovski, Z., Simeone, O., Dimitrova, T., Popovski, P.,
Random Access in C-RAN for User Activity Detection With Limited-Capacity Fronthaul,
SPLetters(24), No. 1, January 2017, pp. 17-21.
IEEE DOI 1702
cloud computing BibRef

Yu, N.Y.,
Indistinguishability of Compressed Encryption With Circulant Matrices for Wireless Security,
SPLetters(24), No. 2, February 2017, pp. 181-185.
IEEE DOI 1702
compressed sensing BibRef

Zheng, Z., Song, L., Han, Z.,
Bridge the Gap Between ADMM and Stackelberg Game: Incentive Mechanism Design for Big Data Networks,
SPLetters(24), No. 2, February 2017, pp. 191-195.
IEEE DOI 1702
Big Data BibRef

Chen, Q., Kang, D., He, Y., Chang, T.H., Liu, Y.F.,
Joint Power and Admission Control Based on Channel Distribution Information: A Novel Two-Timescale Approach,
SPLetters(24), No. 2, February 2017, pp. 196-200.
IEEE DOI 1702
approximation theory BibRef

Zheng, Y., Yuan, X., Wang, X., Jiang, J., Wang, C., Gui, X.,
Toward Encrypted Cloud Media Center With Secure Deduplication,
MultMed(19), No. 2, February 2017, pp. 251-265.
IEEE DOI 1702
cloud computing BibRef

Li, W., Wang, X., Moran, B.,
Wireless Signal Travel Distance Estimation Using Non-Coprime Wavelengths,
SPLetters(24), No. 1, January 2017, pp. 27-31.
IEEE DOI 1702
signal processing BibRef

Kwon, M., Park, H.,
Distributed Network Formation Strategy for Network Coding Based Wireless Networks,
SPLetters(24), No. 4, April 2017, pp. 432-436.
IEEE DOI 1704
decision making BibRef

Sedjelmaci, H., Senouci, S.M., Ansari, N.,
Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology,
ITS(18), No. 5, May 2017, pp. 1143-1153.
IEEE DOI 1705
Bayes methods, Games, Intrusion detection, Monitoring, Unmanned aerial vehicles, Bayesian game, intrusion detection system (IDS), intrusion ejection system (IES), unmanned aerial vehicles (UAVs), vehicular, networks BibRef

Larhlimi, A., Mestari, M., El Khaili, M.,
GPU parallel neural hierarchical multi objective solver for burst routing and wavelength assignment,
ISCV17(1-6)
IEEE DOI 1710
Burst Routing and Wavelength Assignment, Compute Unified Device Architecture, Graphics Processing Unit, BibRef

Yin, H., Zhang, X., Zhao, S., Luo, Y., Tian, C., Sekar, V.,
Tradeoffs Between Cost and Performance for CDN Provisioning Based on Coordinate Transformation,
MultMed(19), No. 11, November 2017, pp. 2583-2596.
IEEE DOI 1710
Decision support systems, Clustering, server provisioning, transform BibRef

Guerreiro, P., Xavier, J.,
Distributed Learning With Time Correlated Information,
SPLetters(24), No. 11, November 2017, pp. 1636-1640.
IEEE DOI 1710
Communication networks, Correlation, Diseases, Indexes, Markov processes, Time measurement, Distributed learning, Markov chains, Perron-Frobenius theorem, multiple hypotheses testing, networks BibRef

Hu, D., Zhang, Q., Yang, P., Qin, J.,
Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks,
SPLetters(24), No. 11, November 2017, pp. 1714-1718.
IEEE DOI 1710
Jamming, Monitoring, Relay networks (telecommunications), Search methods, Wireless communication, Amplify-and-forward (AF), BibRef


Mohan, R.[Ram], Chaudhury, S.[Santanu], Lall, B.[Brejesh],
Incremental Learning of Non-stationary Temporal Causal Networks for Telecommunication Domain,
PReMI17(501-508).
Springer DOI 1711
BibRef

Elejla, O.E.[Omar E.], Belaton, B.[Bahari], Anbar, M.[Mohammed], Alijla, B.O.[Basem O.],
IPv6 OS Fingerprinting Methods: Review,
IVIC17(661-668).
Springer DOI 1711
BibRef

Zabri, Z.[Zahidan], Nohuddin, P.N.E.[Puteri N. E.],
Analyzing and Detecting Network Intrusion Behavior Using Packet Capture,
IVIC17(750-761).
Springer DOI 1711
BibRef

Zyad, E., Khalid, C., Mohammed, B.,
Combination of R1-PCA and median LDA for anomaly network detection,
ISCV17(1-5)
IEEE DOI 1710
reduction dimension algorithms, zero day attacks, Anomaly detection, Computer crime, Intrusion detection, Principal component analysis, Robustness, Training, KDDcup99, LDA, BibRef

Alaoui, E.A.A., Lamhamdi, M.,
Study of the energy performance of DTN protocols,
ISCV17(1-7)
IEEE DOI 1710
DTN routing, Delay Tolerant Networks (DTN), Energy efficient, ONE, simulator BibRef

Sadek, B.A., Houssaine, T.E., Noreddine, C.,
A robust PID controller for active queue management framework in congested routers,
ISCV17(1-6)
IEEE DOI 1710
control system synthesis, linear matrix inequalities, BibRef

Kempa, W.M.,
On buffer overflow duration in WSN with a vacation-type power saving mechanism,
WSSIP17(1-5)
IEEE DOI 1707
Batteries, Image processing, Mathematical model, Wireless sensor networks, buffer overflow, packet losses, BibRef

Korona, M., Skowron, K., Trzepinski, M., Rawski, M.,
FPGA implementation of IPsec protocol suite for multigigabit networks,
WSSIP17(1-5)
IEEE DOI 1707
Field programmable gate arrays, Hardware, IP networks, Logic gates, Prototypes, Security, Throughput, FPGA, IPsec, hardware, implementation BibRef

Geller, B.,
Advanced synchronization techniques for the Internet of Things,
ISIVC16(180-184)
IEEE DOI 1704
Bayes methods BibRef

Yang, J., Geller, B., Arbi, T.,
Proposal of a multi-standard transceiver for the WBAN Internet of Things,
ISIVC16(369-373)
IEEE DOI 1704
Frequency synchronization BibRef

Massaoudi, A., Sellami, N., Siala, M.,
On the impact of pdf-matched quantization for heterogeneous cognitive radio networks,
ISIVC16(259-263)
IEEE DOI 1704
Base stations BibRef

NasrLeila, I., Atallah, N., Cherif, S., Geller, B.,
Time synchronization in IoT networks: Case of a wireless body area network,
ISIVC16(297-301)
IEEE DOI 1704
ML estimation;Time synchronization;WBAN;non-coherent detector BibRef

Rihani, M.A., Prévotet, J.C., Nouvel, F., Mroue, M., Mohanna, Y.,
ARM-FPGA based platform for automated adaptive wireless communication systems using partial reconfiguration technique,
DASIP16(113-120)
IEEE DOI 1704
field programmable gate arrays BibRef

Moréac, E., Rossi, A., Laurent, J., Bomel, P.,
Crosstalk-aware link power model for Networks-on-Chip,
DASIP16(121-128)
IEEE DOI 1704
crosstalk BibRef

Abbes, Y., Najeh, S., Besbes, H.,
Tractable framework for modeling and analyzing Joint CoMP Transmission and eICIC technology in two-tier heterogeneous cellular networks,
ISIVC16(1-6)
IEEE DOI 1704
Analytical models BibRef

Essassi, S., Hamila, R., Cherif, S., Siala, M., Hasna, M.O.,
Power control and RB allocation in cloud radio access networks,
ISIVC16(148-152)
IEEE DOI 1704
Biological cells BibRef

Mashhadi, F., Asaduzzaman, A., Mridha, M.F.,
A novel resource scheduling approach to improve the reliability of Shuffle-exchange networks,
IVPR17(1-6)
IEEE DOI 1704
Monte Carlo methods BibRef

Xie, J.L.[Jian-Li], Dang, J.W.[Jian-Wu], Li, C.[Cuiran], Lian, X.P.[Xiao-Ping], Lin, J.[Junting],
Ecology-inspired Admission Control scheme in heterogeneous wireless Networks,
ICIVC16(140-144)
IEEE DOI 1610
radio access networks BibRef

Isikdag, U., Pilouk, M.,
Integration Of Geo-sensor Feeds And Event Consumer Services For Real-time Representation of IOT Nodes,
ISPRS16(B4: 267-274).
DOI Link 1610
BibRef

Al-Shamisi, A., Louvieris, P., Al-Mualla, M., Mihajlov, M.,
Towards a theoretical framework for an active cyber situational awareness model,
WSSIP16(1-6)
IEEE DOI 1608
security of data BibRef

Peter, T., Pavol, H., Lukáš, D.,
Implementation and evaluation of IPv6 to IPv4 transition mechanisms in network simulator 3,
WSSIP16(1-4)
IEEE DOI 1608
IP networks BibRef

Al-Jumeily, D., Hussain, A., MacDermott, Á., Seeckts, G., Lunn, J.,
Methods and techniques to support the development of fraud detection system,
WSSIP15(224-227)
IEEE DOI 1603
security of data BibRef

Safiulin, I., Schwarz, S., Rupp, M.,
System level simulation of LTE MBSFN networks with high mobility users,
WSSIP15(21-24)
IEEE DOI 1603
Gaussian noise BibRef

Berisha, T., Midoglu, C., Homayouni, S., Svoboda, P., Rupp, M.,
Measurement setup for automatized baselining of WLAN network performance,
WSSIP15(25-28)
IEEE DOI 1603
radio links BibRef

Marah, H.M., Elrajubi, O.M., Abouda, A.A.,
Fraud detection in international calls using fuzzy logic,
ICCVIA15(1-6)
IEEE DOI 1603
decision making BibRef

Lu, C.L.[Chun-Lin], Zhai, L.[Lidong], Liu, T.[Tao], Li, N.[Na],
Network Intrusion Detection Based on Neural Networks and D-S Evidence,
VSWS15(332-343).
Springer DOI 1603
BibRef

Wei, Z.[Zhuo], Deng, R.H.[Robert H.], Shen, J.[Jialie], Zhu, J.X.[Ji-Xiang], Ouyang, K.[Kun], Wu, Y.D.[Yong-Dong],
Multidimensional Context Awareness in Mobile Devices,
MMMod15(II: 38-49).
Springer DOI 1501
BibRef

Ju, X.Y.[Xiang-Yu],
Android malware detection through permission and package,
ICWAPR14(61-65)
IEEE DOI 1402
Accuracy BibRef

Kuri-Morales, A.[Angel], Cortés-Arce, I.[Iván],
Improved Performance of Computer Networks by Embedded Pattern Detection,
MCPR14(21-30).
Springer DOI 1407
BibRef

Vegh, L.[Laura], Miclea, L.[Liviu],
A new approach towards increased security in cyber-physical systems,
WSSIP14(175-178) 1406
Communities BibRef

Dziurzanski, P.[Piotr], Maka, T.[Tomasz],
Network on chips link bandwidth minimization of deadlock-free multi-path routing,
WSSIP14(131-134) 1406
Clocks BibRef

Serrano, J.M.B.[José Manuel Bande], Palancar, J.H.[José Hernández], Cumplido, R.[René],
High Throughput Signature Based Platform for Network Intrusion Detection,
CIARP13(II:544-551).
Springer DOI 1311
BibRef

Saxena, S.[Sanklan], Kumar, A.[Anugrah], Roy, S.S.[Sanjiban Sekhar],
Determination of network vulnerability factor using rough set,
ICSIPR13(263-268).
IEEE DOI 1304
BibRef

Tran, T.[Tri], Ha, Q.P.,
Parameterised quadratic constraints for network systems subject to multiple communication topologies,
ICARCV12(221-228).
IEEE DOI 1304
BibRef

Xin, K.[Kefei], Cao, X.H.[Xiang-Hui], Cheng, P.[Peng], Chen, J.M.[Ji-Ming],
Optimal controller location in wireless sensor and actuator networks,
ICARCV12(560-565).
IEEE DOI 1304
BibRef

Wu, M.Q.[Meng-Qi], Xia, Y.Q.[Yuan-Qing], Fu, M.Y.[Meng-Yin],
Application of NPC in wireless networked control systems,
ICARCV12(584-589).
IEEE DOI 1304
BibRef

Xu, J.[Jun], Xie, L.H.[Li-Hua], Khanna, N.[Nitish], Chee, W.H.[Wei Hong],
Cooperative control in HNMSim: A 3D hybrid networked MAS simulator,
ICARCV12(626-631).
IEEE DOI 1304
BibRef

Yuan, X.D.[Xiao-Dan], Yu, M.[Mei], Xiao, W.D.[Wen-Dong],
Robust stabilization of multiple coupled networked control system via jump linear system approach,
ICARCV12(690-694).
IEEE DOI 1304
BibRef

Cheng, H.[Hui], Chen, Y.[Yi], Wong, W.S.[Wing Shing], Yang, Q.[Qiong], Shen, L.F.[Lian-Feng],
Protocol sequence based wireless media access control in networked control systems,
ICARCV12(707-712).
IEEE DOI 1304
BibRef

Corona, I.[Igino], Tronci, R.[Roberto], Giacinto, G.[Giorgio],
SuStorID: A multiple classifier system for the protection of web services,
ICPR12(2375-2378).
WWW Link. 1302
BibRef

Gao, Y.[Yaqi], Zheng, S.J.[Shi-Jue],
A metadata access strategy of learning resources based on HDFS,
IASP11(620-622).
IEEE DOI 1112
File system access BibRef

Yang, F.Y.[Feng-Ying], Liu, H.C.[Hui-Chao],
Research in HDFS based on the campus network environment,
IASP11(648-652).
IEEE DOI 1112
BibRef

Zhang, R.Z.[Ren-Zhi], Li, L.Q.[Liu-Qing], Zhang, C.J.[Cai-Jun],
The application of middleware technology to communication network real-time monitoring system,
IASP11(488-491).
IEEE DOI 1112
BibRef

Huang, W.[Wenhu], Zheng, S.[Shijue], Zhang, P.[Ping],
Research of data packet transmission based on SMS services,
IASP11(557-560).
IEEE DOI 1112
BibRef

Zhao, F.[Fuzhe], Li, R.[Ru], Kang, Y.B.[Yuan-Bing],
Stability analysis of FAST TCP using PI transfer function,
IASP11(52-55).
IEEE DOI 1112
BibRef

Atila, Ü.[Ümit], Karas, I.R.[Ismail Rakip],
Genetic Algorithm-Aided Routing on 3D Dynamic Networks,
GeoInfo10(xx-yy).
PDF File. 1011
BibRef

Nguyen, H.T.[Hai Thanh], Franke, K.[Katrin], Petrovic, S.[Slobodan],
Towards a Generic Feature-Selection Measure for Intrusion Detection,
ICPR101(1529-1532).
IEEE DOI 1008
BibRef

Cheong, M.[Marc], Lee, V.[Vincent],
A Study on Detecting Patterns in Twitter Intra-topic User and Message Clustering,
ICPR10(3125-3128).
IEEE DOI 1008
BibRef

Gargiulo, F.[Francesco], Sansone, C.[Carlo],
Improving Performance of Network Traffic Classification Systems by Cleaning Training Data,
ICPR10(2768-2771).
IEEE DOI 1008
BibRef

Blauensteiner, P.[Philipp], Kampel, M.[Martin], Musik, C.[Christoph], Vogtenhuber, S.[Stefan],
A socio-technical approach for event detection in security critical infrastructure,
SISM10(23-30).
IEEE DOI 1006
BibRef

Guo, W.P.[Wen-Ping], Li, Z.L.[Zhen-Long], Chen, Y.[Ying], Zhao, X.M.[Xiao-Ming],
Security design for Instant Messaging system based on RSA and triple DES,
IASP09(415-418).
IEEE DOI 0904
BibRef

Mazzariello, C.[Claudio], Sansone, C.[Carlo],
Anomaly-Based Detection of IRC Botnets by Means of One-Class Support Vector Classifiers,
CIAP09(883-892).
Springer DOI 0909
BibRef

Li, M.[Muhai], Li, M.[Ming],
A New Approach for Detecting DDoS Attacks Based on Wavelet Analysis,
CISP09(1-5).
IEEE DOI 0910
BibRef

Subhan, F.[Fazli], Hasbullah, H.B.[Halabi B.],
Designing of Roaming Protocol for Bluetooth Equipped Multi Agent Systems,
IVIC09(759-769).
Springer DOI 0911
BibRef

Benkic, K., Malajner, M., Planinsic, P., Cucej, Z.,
On Line Measurements and Visualization of Distances in WSN with RSSI Parameter,
WSSIP09(1-4).
IEEE DOI 0906
Wireless networks. BibRef

Ribeiro, F.N., Zorzo, S.D.,
A Quantitative Evaluation of Privacy in Location Based Services,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Khan, I., Karras, D.A.,
An Efficient Cross Layer Intra and Inter Domain Mobility Solution for IEEE 802.16e Mobile WiMAX,
WSSIP09(1-7).
IEEE DOI 0906
BibRef

Mach, P., Bestak, R.,
Analysis and Performance Evaluation of IEEE 802.16 Enhanced with Decentrally Controlled Relays,
WSSIP09(1-6).
IEEE DOI 0906
BibRef

Malajner, M., Benkic, K., Planinsic, P., Cucej, Z.,
The Accuracy of Propagation Models for Distance Measurement between WSN Nodes,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Kovacik, T., Kotuliak, I.,
Traffic Characterization in IP Multimedia Subsystem,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Christou, P., Kyriakoulakos, K., Sotiriadis, E., Papadopoulos, K., Mplemenos, G.G., Papaefstathiou, I.,
Low-Power Security Modules Optimized for WSNs,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Kapetanovic, T., Kapetanovic, A.,
Modeling and Implementation of the Complex Telecommunication Systems Using the High Performance Computing Resources,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Ulvan, M., Bestak, R.,
Delay Performance of Session Establishment Signaling in IP Multimedia Subsystem,
WSSIP09(1-5).
IEEE DOI 0906
BibRef

Kantzavelou, I., Katsikas, S.K.,
Playing Games with Internal Attackers Repeatedly,
WSSIP09(1-6).
IEEE DOI 0906
BibRef

Spathoulas, G.P., Katsikas, S.K.,
Using a Fuzzy Inference System to Reduce False Positives in Intrusion Detection,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Ulvan, A., Bestak, R.,
The Analysis of Scanning Time in IEEE802.16m's Handover Procedure,
WSSIP09(1-5).
IEEE DOI 0906
BibRef

Neruda, M., Vrana, J., Bestak, R.,
Femtocells in 3G Mobile Networks,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Velivasaki, T.H.N., Zahariadis, T.V., Trakadas, P.T., Capsalis, C.N.,
Interference Analysis of Cognitive Radio Networks in a Digital Broadcasting Spectrum Environment,
WSSIP09(1-5).
IEEE DOI 0906
BibRef

Geneiatakis, D., Vrakas, N., Lambrinoudakis, C.,
Performance Evaluation of a Flooding Detection Mechanism for VoIP Networks,
WSSIP09(1-5).
IEEE DOI 0906
BibRef

Romoozi, M.[Morteza], Vahidipour, S.M., Babaei, H.[Hamideh],
Improvement of Connectivity in Mobile Ad Hoc Networks by Adding Static Nodes Based on a Realistic Mobility Model,
ICMV09(138-142).
IEEE DOI 0912
BibRef

Akbari, A.[Abolfazle], Soruri, M.[Mahdi], Jalali, S.V.[Seyed Vahid],
Survey of Stable Clustering for Mobile Ad Hoc Networks,
ICMV09(3-7).
IEEE DOI 0912
Network connectivity itself. BibRef

Zhong, N.[Ning], He, Z.W.[Zun-Wen], Kuang, J.M.[Jing-Ming], Fang, J.[Jun],
Research on the Performance Evaluation Technique for Communication Network,
CISP09(1-5).
IEEE DOI 0910
BibRef

Xue, F.[Feng], Qu, D.M.[Dai-Ming], Zhu, G.X.[Guang-Xi], Li, Y.C.[Yan-Chun],
Smart Channel Switching in Cognitive Radio Networks,
CISP09(1-5).
IEEE DOI 0910
BibRef

Zhang, Y.Q., Yu, X.F., Zhang, Y.J.,
The Design of a Wireless Node of Strain Data Acquisition,
CISP09(1-3).
IEEE DOI 0910
BibRef

Belsis, P., Vassis, D., Gritzalis, S., Skourlas, C.,
W-EHR: A Wireless Distributed Framework for Secure Dissemination of Electronic Healthcare Records,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Tselikis, C., Mitropoulos, S., Douligeris, C., Ladis, E., Georgouleas, K., Vangelatos, C., Komninos, N.,
Empirical Study of Clustering Algorithms for Wireless Ad Hoc Networks,
WSSIP09(1-6).
IEEE DOI 0906
BibRef

Papazoglou, P.M., Karras, D.A., Papademetriou, R.C.,
An Efficient Distributed Event Scheduling Algorithm for Large Scale Wireless Communications Simulation Modelling,
WSSIP09(1-7).
IEEE DOI 0906
BibRef

Charilas, D.E., Markaki, O.I., Vlacheas, P.T.,
Admission Control as a Non-Cooperative Multi-Stage Game between Wireless Networks,
WSSIP09(1-5).
IEEE DOI 0906
BibRef

Tatsiopoulos, C., Ktena, A.,
A Smart ZIGBEE Based Wireless Sensor Meter System,
WSSIP09(1-4).
IEEE DOI 0906
BibRef

Besson, L., Leleu, P.,
A Distributed Intrusion Detection System for Ad-Hoc Wireless Sensor Networks: The AWISSENET Distributed Intrusion Detection System,
WSSIP09(1-3).
IEEE DOI 0906
BibRef

di Gesu, V.[Vito], Lo Bosco, G.[Giosue], Friedman, J.H.[Jerome H.],
Intruders pattern identification,
ICPR08(1-4).
IEEE DOI 0812
BibRef

Yang, D.[Dayu], Qi, H.R.[Hai-Rong],
A network intrusion detection method using independent component analysis,
ICPR08(1-4).
IEEE DOI 0812
BibRef

Este, A.[Alice], Gargiulo, F.[Francesco], Gringoli, F.[Francesco], Salgarelli, L.[Luca], Sansone, C.[Carlo],
Pattern Recognition Approaches for Classifying IP Flows,
SSPR08(885-895).
Springer DOI 0812
BibRef

Rao, D.S., Kumar, G.N., Mallick, D.K.[Dheeresh K.], Jana, P.K.[Prasanta K.],
Parallel Construction of Conflict Graph for Phylogenetic Network Problem,
PReMI07(398-405).
Springer DOI 0712
BibRef

Morin, B.[Benjamin], Debar, H.[Hervé],
Conceptual Analysis of Intrusion Alarms,
CIAP05(91-98).
Springer DOI 0509
BibRef

Zanero, S.[Stefano],
Analyzing TCP Traffic Patterns Using Self Organizing Maps,
CIAP05(83-90).
Springer DOI 0509
BibRef

Chapter on New Unsorted Entries, and Other Miscellaneous Papers continues in
Source Separation, Source Localization, Direction of Arrival, DoA, Analysis .


Last update:Dec 15, 2017 at 20:32:53