| Deploying agents in the network to detect intrusions – Ns2 Network simulator |
| Cyber security education as a tool for trust-building in cross-border public protection and disaster relief operations– Ns2 Network simulator |
| PJCT: Penetration testing based JAVA code testing tool– Ns2 Network simulator |
| Obfuscation of Sensitive Data for Incremental Release of Network Flows– Ns2 Network simulator |
| FAA Aircraft Systems Information Security Protection overview– Ns2 Network simulator |
| Security issues and their solutions in MANET– Ns2 Network simulator |
| Advanced approaches for wireless sensor network applications and cloud analytics– Ns2 Network simulator |
| Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding– Ns2 Network simulator |
| AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context– Ns2 Network simulator |
| A Secure Clustering in MANET through Direct Trust Evaluation Technique– Ns2 Network simulator |
| Enhancing security of one-time password using Elliptic Curve Cryptography with biometrics for e-commerce applications– Ns2 Network simulator |
| A review on secure communication protocol for wireless ad hoc network– Ns2 Network simulator |
| Estimating Traffic and Anomaly Maps via Network Tomography– Ns2 Network simulator |
| Seclius: An Information Flow-Based, Consequence-Centric Security Metric– Ns2 Network simulator |
| Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content– Ns2 Network simulator |
| An robust recursive ant colony optimization strategy in VANET for accident avoidance (RACO-VANET)– Ns2 Network simulator |
| TKP: Three level key pre-distribution with mobile sinks for wireless sensor networks– Ns2 Network simulator |
| Web-based online embedded door access control and home security system based on face recognition– Ns2 Network simulator |
| Sybil attack type detection in Wireless Sensor networks based on received signal strength indicator detection scheme– Ns2 Network simulator |
| Extending the lifetime of barrier coverage by adding sensors to a bottleneck region– Ns2 Network simulator |
| Deployment of secure sharing: Authenticity and authorization using cryptography in cloud environment– Ns2 Network simulator |
| Performance Analysis of TSDRP and AODV Routing Protocol under Black Hole Attacks in MANETs by Varying Network Size– Ns2 Network simulator |
| Proficient toning mechanism for firewall policy assessment– Ns2 Network simulator |
| Effect of colluding attack in collaborative spectrum sensing– Ns2 Network simulator |
| Using cloud computing to improve network operations and management– Ns2 Network simulator |
| 2015 IEEE ns2 network simulator |