Scheduling and Queuing Strategies for Energy Efficient Routings in WMSNs
Ashok K. Chikaraddi,
Meena S. Maralappanavar,
Suvarna G. Kanakaraddi,
Vishwanath Chikkareddi
Vulnerability Detection in Intelligent Environments Authenticated by the OAuth 2.0 Protocol over HTTP/HTTPS
Gilson da Silva Francisco,
Anderson Aparecido Alves da Silva,
Marcelo Teixeira de Azevedo,
Eduardo Takeo Ueda,
Adilson Eduardo Guelfi,
Jose Jesus Perez Alcazar
Detecting Android Malware by Mining Enhanced System Call Graphs
Rajif Agung Yunmar,
Sri Suning Kusumawardani,
Widyawan Widyawan,
Fadi Mohsen
A Hybrid Intrusion Detection System to Mitigate Biomedical Malicious Nodes
Mohammed Abdessamad Goumidi,
Ehlem Zigh,
Naima Hadj-Said,
Adda Belkacem Ali-Pacha