


default search action
International Journal of Ad Hoc and Ubiquitous Computing, Volume 36
Volume 36, Number 1, 2021
- Perarasi T. Sambantham, Ganesan Nagarajan:

Outage probability analysis for relay-based cognitive radio network. 1-7 - Jagadeesha R. Bhat

, Jang-Ping Sheu, Wing-Kai Hon, Cian-You Yang:
Approximation algorithms for profit maximisation in multicast D2D networks. 8-19 - Weimin Wen, Cuijuan Shang, Zaixiu Dong, Huan-Chao Keh, Diptendu Sinha Roy:

An intrusion detection model using improved convolutional deep belief networks for wireless sensor networks. 20-31 - Ahmad Sharif

, Mohsen Nickray, Ali Shahidinejad
:
Energy-efficient fault-tolerant scheduling in a fog-based smart monitoring application. 32-49 - Ammar Almomani

, Ahmad Al Nawasrah, Mohammad Alauthman
, Mohammed Azmi Al-Betar
, Farid Meziane:
Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm. 50-65
Volume 36, Number 2, 2021
- S. Priya, S. Selvakumar

:
Detection of phishing attacks using probabilistic neural network with a novel training algorithm for reduced Gaussian kernels and optimal smoothing parameter adaptation for mobile web services. 67-88 - Farooq Ahmed, Haroon Mahmood, Yasir Niaz:

Mobility modelling for urban traffic surveillance by a team of unmanned aerial vehicles. 89-100 - Gulshan Soni

, Kandasamy Selvaradjou:
A robust guaranteed time slots allotment scheme for real-time and reliable communication in WBANs. 101-113 - Haftay Gebreslasie Abreha, Carlos J. Bernardos

, Antonio de la Oliva
, Luca Cominardi, Arturo Azcorra:
Monitoring in fog computing: state-of-the-art and research challenges. 114-130
Volume 36, Number 3, 2021
- Saurabh Rana

, Dheerendra Mishra
:
Provably secure authenticated content key distribution framework for IoT-enabled enterprise digital rights management systems. 131-140 - Swati Sharma, Sandeep Harit:

Propagation models and their effect on the congestion control in vehicular ad hoc network. 141-154 - Prerna Mohit, Ruhul Amin

, G. P. Biswas:
An e-healthcare authentication protocol employing cloud computing. 155-168 - P. Reba

:
Energy efficient power allocation with antenna selection for interference alignment-based MIMO-OFDM cognitive radio networks. 169-179 - Yunghsiang S. Han, Chao Chen, Sian-Jheng Lin, Baoming Bai:

On fast Fourier transform-based decoding of Reed-Solomon codes. 180-187
Volume 36, Number 4, 2021
- Arwa Badhib, Asma Cherif, Suhair Alshehri

:
An overview of continuous device-to-device authentication techniques for the internet of things. 189-206 - Abhishek Joshi

, Sarang C. Dhongdi, Narayan Suresh Manjarekar
, K. R. Anupama:
Multi-cluster flying ad-hoc network for disaster monitoring applications. 207-221 - Qingdong Huang, Yun Zhou, Sen Hao, Xueqian Yao, Miao Zhang:

Coordinated sensing coverage optimisation in sensor networks using RSSI. 222-229 - Izzat Ghaith, Mohammed Hussein:

Optimised routing algorithm in low Earth orbit satellite networks. 230-237 - Vijaypal Singh Rathor

, Bharat Garg, Mandar Patil, G. K. Sharma:
Security analysis of image CAPTCHA using a mask R-CNN-based attack model. 238-247

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














