-
1341
-
1342
Implementation of lightweight intrusion detection model for security of smart green house and vertical farm
Published 2018-04-01Get full text
Article -
1343
A Dual-Cycle Architecture in Cognitive M2M Wireless Networks
Published 2013-11-01Get full text
Article -
1344
Personal OAuth authorization server and push OAuth for Internet of Things
Published 2017-06-01Get full text
Article -
1345
Low Mismatch Key Agreement Based on Wavelet-Transform Trend and Fuzzy Vault in Body Area Network
Published 2013-06-01Get full text
Article -
1346
Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
Published 2012-12-01Get full text
Article -
1347
A certificateless aggregate signature scheme for security and privacy protection in VANET
Published 2022-05-01Get full text
Article -
1348
Dynamic Rendezvous Based Routing Algorithm on Sparse Opportunistic Network Environment
Published 2015-02-01Get full text
Article -
1349
Robust and Energy-Efficient Data Gathering in Wireless Sensor Network
Published 2014-10-01Get full text
Article -
1350
-
1351
Holes Detection in Anisotropic Sensornets: Topological Methods
Published 2012-10-01Get full text
Article -
1352
Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks
Published 2013-04-01Get full text
Article -
1353
Multiantenna Analog Network Coding for Multihop Wireless Networks
Published 2010-01-01Get full text
Article -
1354
Bloom filter–based efficient broadcast algorithm for the Internet of things
Published 2017-12-01Get full text
Article -
1355
Capacity Improvement for DVB-NGH with Dual-Polarized MIMO Spatial Multiplexing and Hybrid Beamforming
Published 2020-01-01Get full text
Article -
1356
-
1357
-
1358
An inside look into the complexity of box-office revenue prediction in China
Published 2017-01-01Get full text
Article -
1359
Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks
Published 2016-07-01Get full text
Article -
1360
Deep learning for object recognition: A comprehensive review of models and algorithms
Published 2025-12-01Get full text
Article