4. layered approach using conditional random fields for intrusion detection
24. layered approach using conditional random fields for intrusion detection
10. agent based efficient anomaly intrusion detection system in adhoc networks 2010 java
24. sybil limit a near optimal social network defense against sybil attacks
Minimizing delay and maximizing lifetime for wireless sensor networks with any cast
Multibiometric cryptosystems based on feature level fusion.bak
Collaborative sensing to_improve_information_quality_for_target_tracking_in_wireless_sensor_networks
Local broadcast algorithms in wireless ad hoc networks reducing the number of transmissions.bak
Received base paper
Capacity scaling of wireless ad hoc networks shannon meets maxwell.bak
Adaptive opportunistic routing for wireless ad hoc networks.bak
A stochastic model of multivirus dynamics.bak
Dual link failure resiliency through backup link mutual exclusion
Image reduction using means on discrete product lattices.bak
Multicast routing with delay and delay variation constraints for collaborative applications on overlay networks
Biased random walks in uniform wireless networks
Efficient audit service outsourcing for data integrity in clouds.bak
36. an abuse free fair contract-signing protocol based on the rsa signature
Cooperative provable data possession for integrity integrity verification in multi cloud storage.bak
Maximizing delay and minimizing life time of wireless sensor with anycast.