Now showing items 5632-5651 of 9750

    TitleAuthorPublication DatePublisherType
    Second law analysis of compressible flow through a diffuser subjected to constant wall temperature  Arshad, M.H.; Kahraman, R.; Sahin, A.Z.; Mansour, R.B.2010InderscienceArticle
    Secondary users selection and sparse narrow-band interference mitigation in cognitive radio networks  Gouissem A.; Hamila R.; Aldhahir N.; Foufou S.2018Elsevier B.V.Article
    Secondary vs. Tertiary oil recovery from a two-dimensional porous media by microemulsion flooding  Sayyouh, M. H.1989Qatar UniversityArticle
    Secrecy outage performance analysis of massive MIMO transmission with multiple non-colluding eavesdroppers and partial legitimate user CSI  Bao T.; Yang H.-C.; Hasna M.O.2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Secrecy performance of AF relaying in cooperative NOMA over rician channel  Zaghdoud N.; Alouane W.H.; Boujemaa H.; Mnaouer A.B.; Touati F.2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Secret Key Agreement for Data Dissemination in Vehicular Platoons  Li K.; Lu L.; Ni W.; Tovar E.; Guizani M.2019Institute of Electrical and Electronics Engineers Inc.Article
    Secretory laccase from pestalotiopsis species CDBT-F-G1 fungal strain isolated from high altitude: Optimization of its production and characterization  Yadav, Mukesh; Bista, Garima; Maharjan, Rocky; Poudyal, Pranita; Mainali, Milan; ... more authors 2019MDPI AGArticle
    Secure and efficient data transmission for cluster-based wireless sensor networks  Lu, Huang; Li, Jie; Guizani, Mohsen2014IEEEArticle
    Secure DoF for the MIMO MAC: The case of knowing eavesdropper's channel statistics only  Amir M.; Khattab T.; Yaacoub E.; Abualsaud K.; Guizani M.2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Secure mHealth IoT data transfer from the patient to the hospital: A three-tier approach  Yaacoub E.; Abualsaud K.; Khattab T.; Guizani M.; Chehab A.2019Institute of Electrical and Electronics Engineers Inc.Article
    Secure Performance of AF and DF Relaying in Cooperative Noma Systems  Zaghdoud N.; Alouane W.H.; Boujemaa H.; Touati F.2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Secure policy execution using reusable garbled circuit in the cloud  Alam M.; Emmanuel N.; Khan T.; Khan A.; Javaid N.; ... more authors 2018Elsevier B.V.Article
    Secure smart contract-enabled control of battery energy storage systems against cyber-attacks  Mhaisen N.; Fetais N.; Massoud A.2019Elsevier B.V.Article
    Secure two-user AF relaying networks using cooperative jamming  Mallat W.; Alouane W.H.; Boujemaa H.; Touati F.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Secure UAV communication networks over 5G  Li B.; Fei Z.; Zhang Y.; Guizani M.2019Institute of Electrical and Electronics Engineers Inc.Article
    Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments  Xia Q.; Sifah E.B.; Obour Agyekum K.O.-B.; Xia H.; Acheampong K.N.; ... more authors 2019Institute of Electrical and Electronics Engineers Inc.Article
    Securitization: Conceptualizing Qatari Foreign Policy
    Alternative Title: الأمن و التصور النظري للسياسة الخارجية القطرية
    
    Dogan, Betul2017Master Thesis
    Security and privacy in emerging networks: Part 1 [Guest Editorial]  Guizani, Mohsen; He, Daojing; Ren, Kui; Rodrigues, Joel; Chan, Sammy; ... more authors 2015IEEEArticle
    Security and privacy preservation in fog-based crowd sensing on the internet of vehicles  Sun G.; Sun S.; Sun J.; Yu H.; Du X.; ... more authors 2019Academic PressArticle
    Security Dynamics of Cloud Computing  Khan, Khaled M.2009Cutter ConsortiumArticle