default search action
International Journal of Ad Hoc and Ubiquitous Computing, Volume 36
Volume 36, Number 1, 2021
- Perarasi T. Sambantham, Ganesan Nagarajan:
Outage probability analysis for relay-based cognitive radio network. 1-7 - Jagadeesha R. Bhat, Jang-Ping Sheu, Wing-Kai Hon, Cian-You Yang:
Approximation algorithms for profit maximisation in multicast D2D networks. 8-19 - Weimin Wen, Cuijuan Shang, Zaixiu Dong, Huan-Chao Keh, Diptendu Sinha Roy:
An intrusion detection model using improved convolutional deep belief networks for wireless sensor networks. 20-31 - Ahmad Sharif, Mohsen Nickray, Ali Shahidinejad:
Energy-efficient fault-tolerant scheduling in a fog-based smart monitoring application. 32-49 - Ammar Almomani, Ahmad Al Nawasrah, Mohammad Alauthman, Mohammed Azmi Al-Betar, Farid Meziane:
Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm. 50-65
Volume 36, Number 2, 2021
- S. Priya, S. Selvakumar:
Detection of phishing attacks using probabilistic neural network with a novel training algorithm for reduced Gaussian kernels and optimal smoothing parameter adaptation for mobile web services. 67-88 - Farooq Ahmed, Haroon Mahmood, Yasir Niaz:
Mobility modelling for urban traffic surveillance by a team of unmanned aerial vehicles. 89-100 - Gulshan Soni, Kandasamy Selvaradjou:
A robust guaranteed time slots allotment scheme for real-time and reliable communication in WBANs. 101-113 - Haftay Gebreslasie Abreha, Carlos J. Bernardos, Antonio de la Oliva, Luca Cominardi, Arturo Azcorra:
Monitoring in fog computing: state-of-the-art and research challenges. 114-130
Volume 36, Number 3, 2021
- Saurabh Rana, Dheerendra Mishra:
Provably secure authenticated content key distribution framework for IoT-enabled enterprise digital rights management systems. 131-140 - Swati Sharma, Sandeep Harit:
Propagation models and their effect on the congestion control in vehicular ad hoc network. 141-154 - Prerna Mohit, Ruhul Amin, G. P. Biswas:
An e-healthcare authentication protocol employing cloud computing. 155-168 - P. Reba:
Energy efficient power allocation with antenna selection for interference alignment-based MIMO-OFDM cognitive radio networks. 169-179 - Yunghsiang S. Han, Chao Chen, Sian-Jheng Lin, Baoming Bai:
On fast Fourier transform-based decoding of Reed-Solomon codes. 180-187
Volume 36, Number 4, 2021
- Arwa Badhib, Asma Cherif, Suhair Alshehri:
An overview of continuous device-to-device authentication techniques for the internet of things. 189-206 - Abhishek Joshi, Sarang C. Dhongdi, Narayan Manjarekar, K. R. Anupama:
Multi-cluster flying ad-hoc network for disaster monitoring applications. 207-221 - Qingdong Huang, Yun Zhou, Sen Hao, Xueqian Yao, Miao Zhang:
Coordinated sensing coverage optimisation in sensor networks using RSSI. 222-229 - Izzat Ghaith, Mohammed Hussein:
Optimised routing algorithm in low Earth orbit satellite networks. 230-237 - Vijaypal Singh Rathor, Bharat Garg, Mandar Patil, G. K. Sharma:
Security analysis of image CAPTCHA using a mask R-CNN-based attack model. 238-247
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.