please contact us for this projects at low cost
S.NO | TITLE | DOMAIN | MONTH/YEAR |
1 | Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks | Mobile Computing | March 2014 |
2 | Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks | Mobile Computing | Feb 2014 |
3 | Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks | Networking | Feb 2014 |
4 | Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks | Parallel distributed systems | March 2014 |
5 | Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks | Parallel distributed systems | May 2014 |
6 | Link Quality Aware Code Dissemination in Wireless Sensor Networks | Parallel distributed systems | July 2014 |
7 | Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks | Parallel distributed systems | July 2014 |
8 | Incentive Based Data Sharing in Delay Tolerant Mobile Networks | Wireless Communications | Jan 2014 |
9 | Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking | Smart Grid | March 2014 |
10 | Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing | Parallel Distributed Systems | May 2014 |
11 | Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks | Parallel Distributed Systems | Preprint 2014 |
12 | Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks | Parallel Distributed Systems | Preprint |
13 | Cross-Layer Approach for Minimizing Routing Disruption in IP Networks | Parallel Distributed Systems | July 2014 |
14 | Minimum Cost Blocking Problem in Multi-Path Wireless Routing Protocols | Computers | July 2014 |
15 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | Mobile Computing | Preprint 2014 |
16 | A Study on False Channel Condition Reporting Attacks in Wireless Networks | Mobile Computing | May 2014 |
17 | Bandwidth Distributed Denial of Service: Attacks and Defenses | Security & Privacy | Jan-Feb 2014 |
18 | STARS: A Statistical Traffic Pattern Discovery System for MANETs | Dependable Secure Computing | March-April 2014 |
19 | A Novel Approach to Trust Management in Unattended Wireless Sensor Networks | Mobile Computing | July 2014 |
20 | Designing Energy Routing Protocol with Power Consumption Optimization in MANET | Emerging Topics in Computing | Preprint 2014 |
21 | PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks | Vehicular Technology | Feb 2014 |
22 | Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach | Systems Journal | Preprint 2014 |
23 | Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning | Vehicular Technology | Preprint 2014 |
24 | KNN Query Processing Methods in Mobile Ad Hoc Networks | Mobile Computing | May 2014 |
25 | AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments | Vehicular Technology | Preprint 2014 |