Author(s): Zayed Al Haddad, Mostafa Hanoune, Abdelaziz Mamouni
Keyword(s): Security, Cloud Computing, NIDS, Cloud based IDS, Virtual infrastructure
Author(s): Zakia El uahhabi, Hanan El bakkali
Keyword(s): PKI, certificate authority, trust level, reputation, certificate policy, X.509 certificate
Author(s): V.Sowmya Devi, Nagaratna P Hegde
Author(s): Ruki Harwahyu, Misbahuddin , Riri Fitri Sari
Keyword(s): Random Access, LTE, 4G, RACH, Backoff, Location service
Keyword(s): Multithreading, Multitasking, Protothreads, WSNs, Cooja, MMEDD
Author(s): S. M. Kamruzzaman, Xavier Fernando, Mohammad Jaseemuddin
Keyword(s): Spectrum, energy aware, Multipath routing, Cognitive radio, ad hoc networks, cognitive user, primary user
Author(s): R. Thandeeswaran, M A Saleem Durai
Keyword(s): Dempster Shafer approach, Authentication, Security, CAPTCHA
Author(s): Nageswararao Sirisala, C.Shoba Bindu
Keyword(s): Quality of Service, Trust, Aggregation, Mobile Adhoc Network
Author(s): Khalid M. Al-Smoul, Thamer A. Al-Rawashdeh, Ali A. Al-Dahoud
Keyword(s): WSNs, LEACH, and Solar Energy
Author(s): Aqeel-ur-Rehman , Sadiq Ur Rehman, Iqbal Uddin Khan, Muzaffar Moiz, Sarmad Hasan
Keyword(s): Security, Privacy, IoT, Authentication, Access Control, Identification