• A denial-of-service resistant quality-of-service signaling protocol for mobile ad hoc networks

  • On increasing end-to-end throughput in wireless ad hoc networks

  • The QuORRUM protocol: efficient tree repair for qualification-based multicast

  • Cooperative-diversity slotted ALOHA

  • Retransmission strategies for wireless connections with resource-limited devices

  • Enhancing QoS support for vertical handoffs using implicit/explicit handoff notifications

  • Novel service oriented handoffs in heterogeneous wireless networks

  • Smooth handoff with enhanced packet buffering-and-forwarding in wireless/mobile networks

  • Layer-2 mobility management in hybrid wired/wireless systems

  • TCP streaming for low-delay wireless video

  • On Maintaining Multimedia Session’s Quality in CDMA Cellular Networks Using a Rate Adaptive Framework

  • Effective capacity channel model for frequency-selective fading channels

  • Utility-based adaptive resource allocation in hybrid wireless networks

  • Adaptive resource management for mobile multimedia communications in asymmetric wireless network

  • Path protection with pre-identification for MPLS networks

  • On the variable capacity property of CC/DS-CDMA systems

  • Fuzzy control for guaranteeing absolute delays in Web servers

  • Access point power saving in solar/battery powered IEEE 802.11 ESS mesh networks

  • Proportional nested deficit round robin with credit adjusting

  • QoS signaling across heterogeneous wired/wireless networks: resource management in DiffServ using the NSIS protocol suite

  • DiffServ aware link adaptation for CDMA radio systems

  • Uplink QoS-aware admission control in WCDMA networks with class-based power sharing

  • Modeling the network forensics behaviors

  • Network forensics: towards a classification of traceback mechanisms

  • Leakage of classified information by e-mail: a case study

  • Cyberprofiling: offender profiling and geographic profiling of crime on the Internet

  • Investigating real-time system forensics

  • Trusted Internet forensics: design of a network forensics appliance

  • Sharing Network Logs for Computer Forensics: A New Tool for the Anonymization of NetFlow Records

  • Security analysis and solutions for deploying IP telephony in the critical infrastructure

  • Advanced authentication and authorization for quality of service signaling

  • Vulnerabilities in SOHO VoIP gateways

  • Preventing theft of quality of service on open platforms

  • Design and implementation of a tunable encryption service for networked applications

  • Next generation communications and secure seamless handover

  • Comparison of security protocols in mobile wireless environments: tradeoffs between level of security obtained and battery life

  • New approach for selfish nodes detection in mobile ad hoc networks

  • FIrDA-SSL: experiments with securing communication in PANs

  • A policy-based approach to wireless LAN security management

  • A security framework with trust management for sensor networks

  • Trust, the "wisdom of crowds", and societal norms: the creation, maintenance, and reasoning about trust in peer networks

  • Caching alternatives for a MANET-oriented OCSP scheme

  • Full agreement in BAN kerberos

  • Social approaches to trust-building in Web technologies

  • Tailored trustworthiness estimations in peer-to-peer networks

  • A comprehensive reputation-based trust model for distributed systems

  • Computational complexity of one reputation metric

  • Performance evaluation of a self-evolving trust building framework

  • Reasoning about trust groups to coordinate mobile ad-hoc systems

  • A context-aware trust-based security system for ad hoc networks