[1]
|
Signal Anti-Jamming Through Encrypted Spreading Codes Based On Frequency Hopping Spread Spectrum
|
|
2016 |
|
|
[2]
|
A REVIEW ON FREQUENCY HOPPING SPREAD SPECTRUM BASED ANTI-JAMMING IMPROVEMENT WITH ENCRYPTED SPREADING CODES
|
|
International Research Journal of Engineering and Technology,
2016 |
|
|
[3]
|
Performance Evaluation of WIMAX Network with High QOS Services Incorporating Different Physical & Mac Layer Standards
|
|
International Journal of Application or Innovation in Engineering & Management,
2015 |
|
|
[4]
|
Performance evaluation of heterogeneous networks for various applications using OPNET modeller
|
|
International Journal on Recent and Innovation Trends in Computing and Communication,
2015 |
|
|
[5]
|
WiMAX (world wide interoperability for Microwave Access), is a standard based wireless technology that provides high throughpu
|
|
International Journal of Advance Research In Science And Engineering,
2014 |
|
|
[6]
|
Coverage Area and Capacity Evaluation for WiMAX Networks
|
|
2014 |
|
|
[7]
|
Performance Analysis of Physical Layer Security Attack on WiMAX System
|
|
International Journal on Human Machine Interaction,
2014 |
|
|
[8]
|
Performance Evaluation of QoS in WLAN-UMTS Network Using OPNET Modeller
|
|
International Journal of Science and Research (IJSR),
2014 |
|
|
[9]
|
QoS Performance for Monitoring and Optimization of Data and VoIP traffic in WiMAX Network Mac Layer
|
|
Remote Detection Of Shoreline Changes,
2013 |
|
|
[10]
|
EOST-an access method for obfuscating spatio-temporal data in LBS
|
|
Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA). Springer Ber,
2013 |
|
|
[11]
|
Performance Analysis of Ranging Process in Diversity Incorporated Wireless Systems Suffering from Narrowband Jamming
|
|
Wireless personal communications. Springer,
2013 |
|
|
[12]
|
Performance Analysis of Network Layer Security Attack in WiMAX System
|
|
Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA). Springer Ber,
2013 |
|
|
[13]
|
Electronic governance in rural areas: a performance case study with WiMAX technology
|
|
Advanced Computing, Networking and Security. Springer,
2012 |
|
|
[14]
|
Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack
|
|
Int'l J. of Communications, Network and System Sciences,
2012 |
|
|
[15]
|
Performance analysis of black hole attack on wimax-wlan interface network
|
|
2012 |
|
|
[16]
|
Security Analysis of WiMAX Network: With Misbehavior Node Attack
|
|
2011 |
|
|
[17]
|
Investigation of Internet Key Exchange (IKE) in Terms of Traffic Security with Gateway Security (GSE) in WiMAX Network
|
|
IJCA Special Issue on Network Security and Cryptography (NSC),
2011 |
|
|
[18]
|
Performance of location based WiMAX network for QoS with optimal base stations (BS)
|
|
Emerging Trends in Electrical and Computer Technology (ICETECT), 2011 International Conference on. IEEE,
2011 |
|
|
[19]
|
A Performance comparison for QoS with different WiMAX environment for video application
|
|
Proceedings of the International Conference & Workshop on Emerging Trends in Technology. ACM,
2011 |
|
|
[20]
|
Location Based Performance of WiMAX Network for QoS with Optimal Base Stations (BS)
|
|
Wireless Engineering and Technology,
2011 |
|
|
[21]
|
A Journey on wimax and its security issues
|
|
International Journal of Computer Science and Information Technologies,
2010 |
|
|
[22]
|
Performance comparison of intelligent jamming in rf (physical) layer with wlan ethernet router and wlan ethernet bridge
|
|
2010 |
|
|