The Concentric-Cluster Routing Scheme adapted to Large-Scale Sensor Networks
An Optimal Access Points Allocation Scheme based on Genetic Algorithm
Active Cyber Attack Model for Network System's Vulnerability Assessment
CHEF: Cluster Head Election mechanism using Fuzzy logic in Wireless Sensor Networks
Experimental QoS test of Medical Data over Wired and Wireless Networks
Effective Value of Decision Tree with KDD 99 Intrusion Detection Datasets of Intrusion
u-MoDEM_ubiquitous Mobile Device Environment Manager based on OMA-DM
A Clustering Method of Enhanced Tree Establishment in Wireless Sensor Networks
pFlours_A New Packet and Flow Gathering Tool
Preventing out-of-sequence packets on the route optimization procedure in Proxy Mobile IPv6
An Investigation of Distance-based Proxy Mobile Client Selection Schemes for NetLMM
A Traffic Analysis of Authentication Methods for Proxy Mobile IPv6
Shall we apply paging technologies to Proxy Mobile IPv6?
An Enhaced Misused Key Detection Mechanism in Wireless Sensor Networks
Advanced Concentric-Clustering Routing Scheme adapted to Large-Scale Sensor Networks
A Misused Key Detection Mechanism for Hierarchical Routings in Wireless Sensor Network
Hybrid PMIPv6 Indication Mechanism for Interaction between MIPv6 and PMIPv6
A Comparative Signaling Cost Analysis of Hierarchical Mobile IPv6 and Proxy Mobile IPv6
Hybrid Mobile Ad hoc Network support for Proxy Mobile IPv6
A Study on the System Recovery: Selecting the Number of Surrogate Nodes for Fast Recovery