Search
Now showing items 1-2 of 2
Packet drop attack detection techniques in wireless Ad hoc networks: a review
(International Journal of Network Security & Its Applications (IJNSA), 2014)
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This
has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack
of ...
Resource sharing between M2M and H2H taffic under time-controlled scheduling scheme in LTE networks
(Proceedings of 2014 8th International Conference on Telecommunication Systems Services and Applications, TSSA 2014, 2014)
Machine-to-Machine (M2M) communication is becoming a commonly used terminology due to the idea of Internet of Things (IoT). M2M communication has many areas of application, such as in; medical, transport, environmental ...