Scheduling and Queuing Strategies for Energy Efficient Routings in WMSNs
Ashok K. Chikaraddi,
Meena S. Maralappanavar,
Suvarna G. Kanakaraddi,
Vishwanath Chikkareddi
Vulnerability Detection in Intelligent Environments Authenticated by the OAuth 2.0 Protocol over HTTP/HTTPS
Gilson da Silva Francisco,
Anderson Aparecido Alves da Silva,
Marcelo Teixeira de Azevedo,
Eduardo Takeo Ueda,
Adilson Eduardo Guelfi,
Jose Jesus Perez Alcazar
Detecting Android Malware by Mining Enhanced System Call Graphs
Rajif Agung Yunmar,
Sri Suning Kusumawardani,
Widyawan Widyawan,
Fadi Mohsen
A Hybrid Intrusion Detection System to Mitigate Biomedical Malicious Nodes
Mohammed Abdessamad Goumidi,
Ehlem Zigh,
Naima Hadj-Said,
Adda Belkacem Ali-Pacha
Cooperative MAC Protocol based on Best Data Rate (CMAC-DR)
Nagesh R.,
M.N. Sree Rangaraju,
N.R. Kushar Gowda,
Vinayak Shekharappa Antin
Towards an Intelligent Electricity Data Management
Amadou Diabagaté,
Yazid Hambally Yacouba,
Jean-Marc Owo,
Adama Coulibaly
Driver Drowsiness Detection System
Amit Kumar Jakhar,
Bhupendra Kumar Pathak,
Kaustubh Mishra,
Rajiv Kumar