| UBackup-II: A QoS-Aware Anonymous Multi-cloud Storage System β M.E IN NS2 SIMULATION | 
| Ctracer: Uncover C&C in Advanced Persistent Threats Based on Scalable Framework for Enterprise Log Data β M.E IN NS2 SIMULATION | 
| Detection of False Data Injection Attacks in Smart Grid Communication Systems β M.E IN NS2 SIMULATION | 
| Pseudonym Schemes in Vehicular Networks: A Survey β M.E IN NS2 SIMULATION | 
| Performance evaluation of Dynamic Multilevel Priority (DMP) packet scheduling method for wireless sensor networks (WSNs) β M.E IN NS2 SIMULATION | 
| An Accountable, Privacy-preserving and Efficient Authentication Framework for Wireless Access Networks β M.E IN NS2 SIMULATION | 
| Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach β M.E IN NS2 SIMULATION | 
| Enabling resilient smart grid communication over the information-centric C-DAX middleware β M.E IN NS2 SIMULATION | 
| e-Health security context management service β M.E IN NS2 SIMULATION | 
| Counter attack to free-riders: Filling a security hole in BitTorrent protocol β M.E IN NS2 SIMULATION | 
| Using Classified Intelligence to Defend Unclassified Networks β M.E IN NS2 SIMULATION | 
| Thwarting Intelligent Malicious Behaviors in Cooperative Spectrum Sensing β M.E IN NS2 SIMULATION | 
| Secrecy Outage Analysis of Multiuser Diversity With Unequal Average SNR in Transmit Antenna Selection Systems β M.E IN NS2 SIMULATION | 
| Adaptive Modulation for Dynamic Point Selection/Dynamic Point Blanking β M.E IN NS2 SIMULATION | 
| Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage β M.E IN NS2 SIMULATION | 
| A Generic Construction of Z-Periodic Complementary Sequence Sets with Flexible Flock Size and Zero Correlation Zone Length β M.E IN NS2 SIMULATION | 
| Differential Full Diversity Spatial Modulation and Its Performance Analysis With Two Transmit Antennas β M.E IN NS2 SIMULATION | 
| Secrecy Rate Maximization With Artificial-Noise-Aided Beamforming for MISO Wiretap Channels Under Secrecy Outage Constraint β M.E IN NS2 SIMULATION | 
| Audit-Free Cloud Storage via Deniable Attribute-based Encryption β M.E IN NS2 SIMULATION | 
| TESLA-based Broadcast Authentication β M.E IN NS2 SIMULATION | 
| RSU-Aided Message Authentication β M.E IN NS2 SIMULATION | 
| Non-invasive heart rate measuring smartphone applications using on-board cameras: A short survey β M.E IN NS2 SIMULATION | 
| Q-Nerve: Propagating signal of a damaged nerve using quantum networking β M.E IN NS2 SIMULATION | 
| Incentive model design for participatory sensing: Technologies and challenges β M.E IN NS2 SIMULATION | 
| Wireless media access depending on packet size distribution over error-prone channels β M.E IN NS2 SIMULATION | 
| 2015 IEEE M.E IN NS2 SIMULATION |