NETWORKING & SECURITY
Branch: Computer Science
Topic: NETWORKING AND SECURITY
2018-2019 NETWORKING TITLES
S.NO | TITLES | DOMAIN | download |
NETWORKING | |||
DST TO N 01 | High Throughput Opportunistic Cooperative Device-to-Device Communications With Caching | NETWORKING | |
DST TO N 02 | Uncertain Data Clustering in Distributed Peer-to-Peer Networks | NETWORKING | |
DST TO N 03 | A Novel Approximation for Multi-Hop Connected Clustering Problem in Wireless Networks | NETWORKING | |
DST TO N 04 | Reliable and Secure End-to-End Data Aggregation Using Secret Sharing in WSNs | NETWORKING | |
DST TO N 05 | A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks | NETWORKING | |
DST TO N 06 | Event-based Fault Detection Filtering for Complex Networked Jump Systems | NETWORKING | |
DST TO N 07 | Incremental Deployment and Throughput Maximization Routing for a Hybrid SDN | NETWORKING | |
DST TO N 08 | Analytical Modeling of Multipath TCP Over Last-Mile Wireless | NETWORKING | |
DST TO N 09 | User-Centric Network MIMO With Dynamic Clustering | NETWORKING | |
DST TO N 10 | Topological Properties of Secure Wireless Sensor Networks Under the q-Composite Key Pre-distribution Scheme With Unreliable Links | NETWORKING | |
DST TO N 11 | Social Norm Incentives for Network Coding in MANETs | NETWORKING | |
DST TO N 12 | An Overlay Architecture for Throughput Optimal Multipath Routing | NETWORKING | |
DST TO N 13 | Routing in Accumulative Multi-Hop Networks | NETWORKING | |
DST TO N 14 | Coding for Improved Throughput Performance in Network Switches | NETWORKING | |
DST TO N 15 | Power Efficiency and Delay Tradeoff of 10GBase-T Energy Efficient Ethernet Protocol | NETWORKING | |
DST TO N 16 | A Scalable Framework for Wireless Distributed Computing | NETWORKING | |
DST TO N 17 | Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels | NETWORKING | |
DST TO N 18 | Data Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems | NETWORKING | |
DST TO N 19 | Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks | NETWORKING | |
DST TO N 20 | A Longitudinal Measurement Study of TCP Performance and Behavior in 3G/4G Networks Over High Speed Rails | NETWORKING | |
DST TO N 21 | On Oblivious Neighbor Discovery in Distributed Wireless Networks With Directional Antennas: Theoretical Foundation and Algorithm Design | NETWORKING | |
DST TO N 22 | When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks | NETWORKING | |
DST TO N 23 | Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks | NETWORKING | |
DST TO N 24 | Security Implications of Permission Models in Smart-Home Application Frameworks | NETWORKING | |
DST TO N 25 | Data-Driven Faulty Node Detection Scheme for Wireless Sensor Networks | NETWORKING | |
DST TO N 26 | Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks | NETWORKING | |
DST TO N 27 | Congestion Control for Background Data Transfers With Minimal Delay Impact | NETWORKING | |
DST TO N 28 | Transient Community Detection and Its Application to Data Forwarding in Delay Tolerant Networks | NETWORKING | |
DST TO N 29 | A Statistical Exploration of Protocol Adoption | NETWORKING | |
DST TO N 30 | No Packet Left Behind: Avoiding Starvation in Dynamic Topologies | NETWORKING | |
DST TO N 31 | Green Virtualization for Multiple Collaborative Cellular Operators | NETWORKING | |
DST TO N 32 | DORE: An Experimental Framework to Enable Outband D2D Relay in Cellular Networks | NETWORKING | |
DST TO N 33 | Congestion Control for Web Real-Time Communication | NETWORKING | |
DST TO N 34 | Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexitys | NETWORKING | |
DST TO N 35 | Network-Based Modeling for Characterizing Human Collective Behaviors During Extreme Events | NETWORKING | |
DST TO N 36 | Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches | NETWORKING | |
DST TO N 37 | Someone in Your Contact List: Cued Recall- Based Textual Passwords | NETWORKING | |
DST TO N 38 | A Game-Theoretic Analysis of Adversarial Classification | NETWORKING | |
DST TO N 39 | A New Rule for Cost Reassignment in Adaptive Steganography | NETWORKING | |
DST TO N 40 | On the Maximum Rate of Networked Computation in a Capacitated Network | NETWORKING | |
DST TO N 41 | Towards Optimal Connectivity on Multi- layered Networks | NETWORKING | |
DST TO N 42 | Uncertain Data Clustering in Distributed Peer-to-Peer Networks | NETWORKING | |
DST TO N 43 | A Secure and Practical Authentication Scheme Using Personal Devices | NETWORKING | |
DST TO N 44 | Full Verifiability for Outsourced Decryption in Attribute Based Encryption | NETWORKING | |
DST TO N 45 | LOMCF: Forwarding and Caching in Named Data Networking based MANETs | NETWORKING | |
DST TO N 46 | Probability of Partially Decoding Network- Coded Messages | NETWORKING | |
DST TO N 47 | Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks | NETWORKING | |
DST TO N 48 | Knowledge Guided Hierarchical Multi-Label Classification over Ticket Data | NETWORKING | |
DST TO N 49 | Knowledge Guided Hierarchical Multi-Label Classification over Ticket Data | NETWORKING | |
DST TO N 50 | An Efficient Cloud Market Mechanism for Computing Jobs With Soft Deadlines | NETWORKING |
INSIGHT
