default search action
Journal of Network and Computer Applications, Volume 38
Volume 38, February 2014
- Ilsun You, Marek R. Ogiela, A Min Tjoa, Dongwan Shin:
Advanced technologies for homeland defense and security. 1-2
- Leszek Lilien, Lotfi Ben Othmane, Pelin Angin, Andrew DeCarlo, Raed M. Salih, Bharat K. Bhargava:
A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks. 3-15 - Dongjin Choi, Byeong-Kyu Ko, Heesun Kim, Pankoo Kim:
Text analysis for detecting terrorism-related articles on the web. 16-21 - Aniello Castiglione, Roberto De Prisco, Alfredo De Santis, Ugo Fiore, Francesco Palmieri:
A botnet-based command and control approach relying on swarm intelligence. 22-33 - Lidia Ogiela, Marek R. Ogiela:
Cognitive systems and bio-inspired computing in homeland security. 34-42 - Seung-Hyun Seo, Aditi Gupta, Asmaa Mohamed Sallam, Elisa Bertino, Kangbin Yim:
Detecting mobile malware threats to homeland security through static analysis. 43-53 - Kerem Irgan, Cem Ünsalan, Sebnem Baydere:
Low-cost prioritization of image blocks in wireless sensor networks for border surveillance. 54-64 - Luigi Catuogno, Hans Löhr, Marcel Winandy, Ahmad-Reza Sadeghi:
A trusted versioning file system for passive mobile storage devices. 65-75 - Zang Li, Chao-Hsien Chu, Wen Yao:
A semantic authorization model for pervasive healthcare. 76-87 - Hsing-Chung Chen:
A multi-issued tag key agreement with time constraint for homeland defense sub-department in NFC environment. 88-98 - Jong-Yeon Park, Dong-Guk Han, Okyeon Yi, Jeong-Nyeo Kim:
An improved side channel attack using event information of subtraction. 99-105
- Subir Halder, Sipra Das Bit:
Enhancement of wireless sensor network lifetime by deploying heterogeneous nodes. 106-124 - Sheng Gao, Jianfeng Ma, Cong Sun, Xinghua Li:
Balancing trajectory privacy and data utility using a personalized anonymization model. 125-134 - Gaya K. Jayasinghe, J. Shane Culpepper, Peter Bertók:
Efficient and effective realtime prediction of drive-by download attacks. 135-149 - Hai Van Luu, Xueyan Tang:
An efficient algorithm for scheduling sensor data collection through multi-path routing structures. 150-162 - Mohammad Doraghinejad, Hossein Nezamabadi-pour, Ali Mahani:
Channel assignment in multi-radio wireless mesh networks using an improved gravitational search algorithm. 163-171
- Messaoud Doudou, Djamel Djenouri, Nadjib Badache, Abdelmadjid Bouabdallah:
Synchronous contention-based MAC protocols for delay-sensitive wireless sensor networks: A review and taxonomy. 172-184 - Wenjing Guo, Wei Zhang:
A survey on intelligent routing protocols in wireless sensor networks. 185-201
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.