Most Accessed Articles

Performance Analysis of Internet of Things Sensor Architectures and Security Primitives

, 2017; 6(1): 15-25.

Savitri Bevinakoppa, Kanaka Sundhoro , Neeraj Kumar, Mubasher Sadeque and Biplob Ray*


DOI: 10.2174/2215081106666170509164502


Optimal Throughput for Reliability and Stability in Wireless Multicast Communication

, 2014; 3(1): 2-8.

Thong Huynh, In-Yeup Kong and Won-Joo Hwang


DOI: 10.2174/2215081102666140623210159


Abstracting IoT Complexity Through an Innovative Virtual Environment

, 2017; 6(1): 2-14.

Marco Alessi, Enza Giangreco, Luca Mainetti, Vincenzo Mighali, Luigi Patrono*, Marco Pinnella, Stefano Pino and Davide Storelli


DOI: 10.2174/2215081106666170601123935


Smart Wireless Sensor Network to Detect and Protect Sheep and Goats to Wolf Attacks

, 2013; 2(2): 91-101.

Sandra Sendra, Ferran Llario, Lorena Parra and Jaime Lloret


DOI: 10.2174/22117407112016660012


A Method for Estimating the Uncertainties in Attacker’s Behavior Using Attack Graph Structure

, 2017; 6(1): 26-40.

Letafat Sadat Mohajirani and Hamed Orojloo*


DOI: 10.2174/2215081106666170102150016


Towards the Design of Social Media to Promote Physical Activity

, 2014; 3(1): 25-32.

Yao Meng


DOI: 10.2174/2215081102666140225004735


Primer and Recent Developments on Fountain Codes

, 2013; 2(1): 2-11.

Jalaluddin Qureshi, Chuan Heng Foh and Jianfei Cai


DOI: 10.2174/22117407112019990001


Webmaster Contact: info@benthamscience.org
Copyright © 2018 Bentham Science