A survey of state-of-the-art in anonymity metrics. [Citation Graph (, )][DBLP]
Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment. [Citation Graph (, )][DBLP]
Towards a Taxonomy of Wired and Wireless Anonymous Networks. [Citation Graph (, )][DBLP]
Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes. [Citation Graph (, )][DBLP]
A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission. [Citation Graph (, )][DBLP]
Using Relocatable Bitstreams for Fault Tolerance. [Citation Graph (, )][DBLP]
Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information. [Citation Graph (, )][DBLP]
Program Fragmentation as a Metamorphic Software Protection. [Citation Graph (, )][DBLP]
Wireless sensor networks: guidelines for design and a survey of current research. [Citation Graph (, )][DBLP]
Enhancing realistic hands-on network training in a virtual environment. [Citation Graph (, )][DBLP]
Iterative Configuration Method: An Effective and Efficient Heuristic for Service Oriented Infrastructure Resource Allocation. [Citation Graph (, )][DBLP]
Energy cost and error performance of range-aware, anchor-free localization algorithms. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP