


default search action
Ad Hoc Networks, Volume 84
Volume 84, March 2019
- Ian F. Akyildiz:

Ad Hoc Networks Editorial for 2018. 1- - Dongfeng Fang, Yi Qian

, Rose Qingyang Hu
:
Security analysis for interference management in heterogeneous networks. 1-8 - Yafang Yang, Bin Guo

, Zhu Wang
, Mingyang Li, Zhiwen Yu
, Xingshe Zhou:
BehaveSense: Continuous authentication for security-sensitive mobile apps using behavioral biometrics. 9-18 - Satish R. Jondhale

, Rajkumar S. Deshpande
:
GRNN and KF framework based real time target tracking using PSOC BLE and smartphone. 19-28 - Themistoklis Charalambous

, Su Min Kim, Nikolaos Nomikos
, Mats Bengtsson, Mikael Johansson
:
Relay-pair selection in buffer-aided successive opportunistic relaying using a multi-antenna source. 29-41 - Ramin Yarinezhad

:
Reducing delay and prolonging the lifetime of wireless sensor network using efficient routing protocol based on mobile sink and virtual infrastructure. 42-55 - Mohit Gupta

, Narendra S. Chaudhari:
Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit. 56-67 - Ahmed Jawad Kadhim, Seyed Amin Hosseini Seno

:
Energy-efficient multicast routing protocol based on SDN and fog computing for vehicular networks. 68-81 - Fang Feng

, Xin Liu
, Binbin Yong, Rui Zhou, Qingguo Zhou
:
Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device. 82-89 - Marcin Kardas, Marek Klonowski

, Piotr Syga
:
How to obfuscate execution of protocols in an ad hoc radio network? 90-106 - Nan Cen

, Jithin Jagannath
, Simone Moretti, Zhangyu Guan, Tommaso Melodia
:
LANET: Visible-light ad hoc networks. 107-123 - George Loukas

, Eirini D. Karapistoli
, Emmanouil Panaousis
, Panagiotis G. Sarigiannidis
, Anatolij Bezemskij, Tuan Vuong:
A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. 124-147 - Endrit Dosti, Mohammad Shehab

, Hirley Alves
, Matti Latva-aho:
On the performance of non-orthogonal multiple access in the finite blocklength regime. 148-157 - Mohamed Rida

, Abdallah Makhoul
, Hassan Harb, David Laiymani
, Mahmoud Barhamgi
:
EK-means: A new clustering approach for datasets classification in sensor networks. 158-169 - Ahmet Cihat Kazez

, Tolga Girici:
Clustering-based device-to-device cache placement. 170-177 - Tan N. Nguyen

, Tran Hoang Quang Minh
, Phuong T. Tran
, Miroslav Voznák
, Tran Trung Duy
, Thanh-Long Nguyen
, Phu Tran Tin
:
Performance enhancement for energy harvesting based two-way relay protocols in wireless ad-hoc networks with partial and full relay selection methods. 178-187

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














