• IEEE 2019: Anomaly Detection and Attribution in Networks with Temporally Correlated Traffic
  • IEEE 2019: Privacy Preserving IP Traceback
  • IEEE 2019: ALLYS: All You can Send for Energy Harvesting Networks
  • IEEE 2019: AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments
  • IEEE 2019: Vehicular Cloud Data Collection for Intelligent Transportation Systems
  • IEEE 2019: Optimizing Cloud-Service Performance: Efficient Resource Provisioning via Optimal Workload Allocation
  • IEEE 2019: Cost Minimization Algorithms for Data CenterManagement
  • IEEE 2019: Multi-party secret key agreement over state-dependent wireless broadcast channels
  • IEEE 2019: STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
  • IEEE 2019:FRAppE: Detecting Malicious Facebook Applications
  • IEEE 2019: Toward Optimum Crowdsensing Coverage with Guaranteed Performance
  • IEEE 2019: PRISM: Privacy-aware Interest Sharing and Matching in Mobile Social Networks
  • IEEE 2019: JOKER: A Novel Opportunistic Routing Protocol
  • IEEE 2019: Software Defined Networking with Pseudonym Systems for Secure Vehicular Clouds
  • IEEE 2019: An Enhanced Available Bandwidth Estimation Technique for an End-to-End Network Path
  • IEEE 2019: Privacy-Preserving Location Sharing Services for Social Networks
  • IEEE 2019: Authenticated Key Exchange Protocols for Parallel Network File Systems
  • IEEE 2019: SmartCrawler: A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces
  • IEEE 2019: JAMMY: a Distributed and Self-Adaptive Solution against Selective Jamming Attack in TDMA WSNs
  • IEEE 2019: Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks
  • IEEE 2019: Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
  • IEEE 2019: SHARP: Secured Hierarchical Anonymous Routing Protocol for MANETs
  • IEEE 2019: CStream: Neighborhood Bandwidth Aggregation for Better Video Streaming
  • IEEE 2019: The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities
  • IEEE 2019: Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter
  • IEEE 2019: Resource Allocation for Energy Efficiency Optimization in Heterogeneous Networks
  • IEEE 2019: A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
  • IEEE 2019: A Computational Dynamic Trust Model for User Authorization
  • IEEE 2019: Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
  • IEEE 2019: A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks