Extending the lifetime of barrier coverage by adding sensors to a bottleneck region
One important application of wireless sensor networks (WSNs) is intruder detection for protection of a region of interest, and k-barrier coverage is...
One important application of wireless sensor networks (WSNs) is intruder detection for protection of a region of interest, and k-barrier coverage is...
A Wireless Sensor network is very exposed to different type of attacks and the most common one is the Sybil attack. A...
Smart home security control system has became indispensable in daily life. The design and development of a home security system, based on human face...
Wireless Sensor Networks are by its nature prone to various forms of security attacks. Authentication and secure communication have become the need of the...
VANET (Vehicle Ad-hoc Network) [1] is an emerging technology that enables the vehicles to communicate with each other. Nowadays, we see...
Mixed Flash and JavaScript content has become increasingly prevalent; its purveyance of dynamic features unique to each platform has popularized...
It is critical to monitor IT systems that are part of energy delivery system infrastructure. The problem with intrusion detection...
Mapping origin-destination (OD) network traffic is pivotal for network management and proactive security tasks. However, lack of sufficient flow-level measurements as well as potential...
The exponential growth and development in the wireless communication, Wireless communication technology gains an importance and can be used in...
Security of one-time password (OTP) is essential because nowadays most of the e-commerce transactions are performed with the help of this...
Technology | Ph.D | M.Tech | M.S |
---|---|---|---|
Wireless Sensor Networks | 3 | 25 | 13 |
Security | 5 | 28 | 18 |
Mobile computing | 7 | 36 | 19 |
Cognitive Radio Network | 4 | 42 | 16 |
IOT | 9 | 19 | 13 |
LTE | 6 | 21 | 19 |
Manet | 2 | 27 | 21 |
Open Flow | 3 | 14 | 24 |
SDN | 11 | 13 | 26 |
VANET | 14 | 36 | 18 |
Vide Streaming | 2 | 4 | 7 |
WBAN | 13 | 13 | 19 |
Vertical Handover | 4 | 12 | 15 |
D-D communication | 2 | 10 | 8 |
Attacks | 32 | 59 | 42 |
WIFI | 2 | 7 | 5 |
Bluetooth | 1 | 2 | 4 |
Social sensor network | 4 | 13 | 26 |
Under water sensor network | 7 | 15 | 11 |
Multicast | 1 | 19 | 7 |
5g,4g | 12 | 34 | 13 |
IPv4,IPV6 | 16 | 42 | 19 |
ALL Rights Reserved @ Network Simulator 2 | Ns2 Projects | Ns2 Research Projects | Network simulator 2 Projects.