Trust Management Scheme for Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]
Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks. [Citation Graph (, )][DBLP]
Trust Formalization in Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]
Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines. [Citation Graph (, )][DBLP]
Off-line Signature Verification using the Enhanced Modified Direction Feature and Neural-based Classification. [Citation Graph (, )][DBLP]
An experimental analysis of GAME: a generic automated marking environment. [Citation Graph (, )][DBLP]
A software-defined radio receiver for APCO project 25 signals. [Citation Graph (, )][DBLP]
Substantiating Security Threats Using Group Outlier Detection Techniques. [Citation Graph (, )][DBLP]
A Study of the TKIP Cryptographic DoS Attack. [Citation Graph (, )][DBLP]
Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies. [Citation Graph (, )][DBLP]
Enhancing Trust on e-Government: A Decision Fusion Module. [Citation Graph (, )][DBLP]
Implementation and Analysis of Sensor Security Protocols in a Home Health Care System. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP