Skip to main content
Top

Mobile Networks and Applications

Issue 1/2020

Special Issue: Security, Privacy and Reliability in Wireless Communication

Content (36 Articles)

Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers

Mamoun F. Al-Mistarihi, Islam M. Tanash, Fedaa S. Yaseen, Khalid A. Darabkh

Enhancing Efficient Link Performance in ZigBee Under Cross-Technology Interference

Zhenquan Qin, Yingxiao Sun, Junyu Hu, Wei Zhou, Jialin Liu

Security and Privacy Issues of UAV: A Survey

Yueyan Zhi, Zhangjie Fu, Xingming Sun, Jingnan Yu

Joint Optimization of Latency Monitoring and Traffic Scheduling in Software Defined Heterogeneous Networks

Xu Zhang, Weigang Hou, Lei Guo, Qihan Zhang, Pengxing Guo, Ruijia Li

Confusing-Keyword Based Secure Search over Encrypted Cloud Data

Zhangjie Fu, Yangen Liu, Xingming Sun, Yuling Liu, Zuwei Tian

Applying Improved Convolutional Neural Network in Image Classification

Zhen-tao Hu, Lin Zhou, Bing Jin, Hai-jiang Liu

Editorial: Security and Privacy Protection for Mobile Applications and Platforms

Victor Sucasas, Georgios Mantas, Saud Althunibat, José-Fernán Martínez Ortega

Open Access

Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud

Saqib Rasool, Muddesar Iqbal, Tasos Dagiuklas, Zia Ul-Qayyum, Shancang Li

An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices

José Ribeiro, Firooz B. Saghezchi, Georgios Mantas, Jonathan Rodriguez, Simon J. Shepherd, Raed A. Abd-Alhameed

A Physical-Layer Key Distribution Mechanism for IoT Networks

Mohanad Alhasanat, Saud Althunibat, Khalid A. Darabkh, Abdullah Alhasanat, Moath Alsafasfeh

Correction

Correction to: A Physical-Layer Key Distribution Mechanism for IoT Networks

Mohanad Alhasanat, Saud Althunibat, Khalid A. Darabkh, Abdullah Alhasanat, Moath Alsafasfeh

AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis

Anam Mehtab, Waleed Bin Shahid, Tahreem Yaqoob, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal, Malik Najmus Saqib

IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks

Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou, Hisham Abdalla

A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises

Mauro Andreolini, Vincenzo Giuseppe Colacino, Michele Colajanni, Mirco Marchetti

Open Access

Disk Cluster Allocation Behavior in Windows and NTFS

Martin Karresand, Stefan Axelsson, Geir Olav Dyrkolbotn

A Market in Dream: the Rapid Development of Anonymous Cybercrime

Gengqian Zhou, Jianwei Zhuge, Yunqian Fan, Kun Du, Shuqiang Lu

Editorial: Reliable Communication for Emerging Wireless Networks

Trung Q. Duong, Chinmoy Kundu, Antonino Masaracchia, Van-Dinh Nguyen

Joint User Association and Power Allocation for Millimeter-Wave Ultra-Dense Networks

H. T. Nguyen, H. Murakami, K. Nguyen, K. Ishizu, F. Kojima, J. D. Kim, S. H. Chung, W. J. Hwang

Full-Duplex Enabled Time-Efficient Device Discovery for Public Safety Communications

Zeeshan Kaleem, Ajmal Khan, Syed Ali Hassan, Nguyen-Son Vo, Long D. Nguyen, Hien M. Nguyen

Current Publications

scroll for more

use your arrow keys for more

scroll or use arrow keys for more