Deploying agents in the network to detect intrusions – Ns2 Network simulator |
Cyber security education as a tool for trust-building in cross-border public protection and disaster relief operations– Ns2 Network simulator |
PJCT: Penetration testing based JAVA code testing tool– Ns2 Network simulator |
Obfuscation of Sensitive Data for Incremental Release of Network Flows– Ns2 Network simulator |
FAA Aircraft Systems Information Security Protection overview– Ns2 Network simulator |
Security issues and their solutions in MANET– Ns2 Network simulator |
Advanced approaches for wireless sensor network applications and cloud analytics– Ns2 Network simulator |
Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding– Ns2 Network simulator |
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context– Ns2 Network simulator |
A Secure Clustering in MANET through Direct Trust Evaluation Technique– Ns2 Network simulator |
Enhancing security of one-time password using Elliptic Curve Cryptography with biometrics for e-commerce applications– Ns2 Network simulator |
A review on secure communication protocol for wireless ad hoc network– Ns2 Network simulator |
Estimating Traffic and Anomaly Maps via Network Tomography– Ns2 Network simulator |
Seclius: An Information Flow-Based, Consequence-Centric Security Metric– Ns2 Network simulator |
Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content– Ns2 Network simulator |
An robust recursive ant colony optimization strategy in VANET for accident avoidance (RACO-VANET)– Ns2 Network simulator |
TKP: Three level key pre-distribution with mobile sinks for wireless sensor networks– Ns2 Network simulator |
Web-based online embedded door access control and home security system based on face recognition– Ns2 Network simulator |
Sybil attack type detection in Wireless Sensor networks based on received signal strength indicator detection scheme– Ns2 Network simulator |
Extending the lifetime of barrier coverage by adding sensors to a bottleneck region– Ns2 Network simulator |
Deployment of secure sharing: Authenticity and authorization using cryptography in cloud environment– Ns2 Network simulator |
Performance Analysis of TSDRP and AODV Routing Protocol under Black Hole Attacks in MANETs by Varying Network Size– Ns2 Network simulator |
Proficient toning mechanism for firewall policy assessment– Ns2 Network simulator |
Effect of colluding attack in collaborative spectrum sensing– Ns2 Network simulator |
Using cloud computing to improve network operations and management– Ns2 Network simulator |
2015 IEEE ns2 network simulator |