1. K Maxim, C Andrey, P Anton, K Igor, Technique of data visualization: example of network topology display for security monitoring. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 7(1), 79–96 (2016)
2. B Bharat, AM Johnson, M Gisele Izera, A Pelin, A systematic approach for attack analysis and mitigation in V2V networks. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 7(1), 97–117 (2016)
3. U Kim, J Kim, Research on object-oriented relational database model and its utilization for dynamic geo-spatial service through next generation ship navigation system, IT Convergence Practice 1(2), 1–10 (2013)
4. Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and K. Higuchi, Non-orthogonal multiple access (NOMA) for cellular future radio access, in Proc. of IEEE VTC-Spring, 2013, pp. 1-5.
5. Umehara, and Y. Kishiyama, Enhancing user fairness in non-orthogonalaccess with successive interference cancellation for cellular downlink, in Proc. of IEEE ICCS, 2012, 324-328