Search Results

There are 29162 results for: content related to: Security in application layer of radar sensor networks: detect friends or foe

  1. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1378–1407, Rajeev Singh and Teek Parval Sharma

    Version of Record online : 21 AUG 2014, DOI: 10.1002/sec.1079

  2. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Version of Record online : 19 JUN 2012, DOI: 10.1002/sec.542

  3. Security assurance in wireless acoustic sensors via event forecasting and detection

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2671–2677, Zhen Zhong, Chenglin Zhao, Yiming Pi and Lingming Wang

    Version of Record online : 26 APR 2012, DOI: 10.1002/sec.538

  4. Designing role-based access control using formal concept analysis

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 373–383, Ch. Aswani Kumar

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.589

  5. The Palestinian Authority: Friend or Foe of Private Investors?

    Middle East Policy

    Volume 9, Issue 1, March 2002, Pages: 53–57, Oussama Kanaan

    Version of Record online : 17 DEC 2002, DOI: 10.1111/1475-4967.00040

  6. Accurate real-time hybrid earthquake simulations on large-scale MDOF steel structure with nonlinear viscous dampers

    Earthquake Engineering & Structural Dynamics

    Volume 44, Issue 12, 10 October 2015, Pages: 2035–2055, Baiping Dong, Richard Sause and James M. Ricles

    Version of Record online : 13 MAR 2015, DOI: 10.1002/eqe.2572

  7. Maker-breaker games on random geometric graphs

    Random Structures & Algorithms

    Volume 45, Issue 4, December 2014, Pages: 553–607, Andrew Beveridge, Andrzej Dudek, Alan Frieze, Tobias Müller and Miloš Stojaković

    Version of Record online : 4 OCT 2014, DOI: 10.1002/rsa.20572

  8. Cardioids-based faster authentication and diagnosis of remote cardiovascular patients

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1351–1368, Fahim Sufi, Ibrahim Khalil and Ibrahim Habib

    Version of Record online : 16 MAR 2011, DOI: 10.1002/sec.262

  9. Ammonium Perchlorate, Friend or Foe?

    Propellants, Explosives, Pyrotechnics

    Volume 39, Issue 5, October 2014, Pages: 707–713, Ruth Tunnell, Mark Ashcroft, Roz Dale, Dave Tod and William G. Proud

    Version of Record online : 20 JUN 2014, DOI: 10.1002/prep.201400030

  10. Boundary stabilization of a cascade of ODE-wave systems subject to boundary control matched disturbance

    International Journal of Robust and Nonlinear Control

    Jun-Jun Liu and Jun-Min Wang

    Version of Record online : 31 MAY 2016, DOI: 10.1002/rnc.3572

  11. Content-based image authentication by feature point clustering and matching

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 636–647, Lei Yang, Jun Tian and Dapeng Wu

    Version of Record online : 23 AUG 2011, DOI: 10.1002/sec.358

  12. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  13. You have free access to this content
    Friend or Foe?

    Allergy

    Volume 36, Issue 7, October 1981, Pages: 445–461, Morten Simonsen

    Version of Record online : 28 APR 2007, DOI: 10.1111/j.1398-9995.1981.tb01856.x

  14. The Term Structure of VIX

    Journal of Futures Markets

    Volume 32, Issue 12, December 2012, Pages: 1092–1123, Xingguo Luo and Jin E. Zhang

    Version of Record online : 16 AUG 2012, DOI: 10.1002/fut.21572

  15. ChemInform Abstract: Is Water a Friend or Foe in Organometallic Chemistry? The Case of Group 13 Organometallic Compounds

    ChemInform

    Volume 32, Issue 24, June 12, 2001, Page: no, Herbert W. Roesky, Mrinalini G. Walawakar and Ramaswamy Murugavel

    Version of Record online : 25 MAY 2010, DOI: 10.1002/chin.200124234

  16. Performance evaluation of collision avoidance schemes in ad hoc networks

    Security and Communication Networks

    Volume 9, Issue 9, June 2016, Pages: 910–937, Suryakant Bhandare, Taha Ben Brahim, Saad Biaz and Prathima Agrawal

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.959

  17. A graph-theoretic framework for isolating botnets in a network

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2605–2623, Padmini Jaikumar and Avinash C. Kak

    Version of Record online : 28 FEB 2012, DOI: 10.1002/sec.500

  18. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Version of Record online : 17 MAY 2012, DOI: 10.1002/sec.540

  19. Reverse-safe authentication protocol for secure USB memories

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 834–845, Kyungroul Lee, Kangbin Yim and Eugene H. Spafford

    Version of Record online : 25 JUL 2012, DOI: 10.1002/sec.580

  20. A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisition

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1193–1198, Hai-Cheng Chu, Szu-Wei Yang and Jong Hyuk Park

    Version of Record online : 26 APR 2012, DOI: 10.1002/sec.511