Skip to main content


Mobile Networks and Applications

Mobile Networks and Applications 1/2020

Ausgabe 1/2020

Special Issue: Security, Privacy and Reliability in Wireless Communication

Inhaltsverzeichnis ( 36 Artikel )

16.04.2019 | Ausgabe 1/2020

Editorial: Physical Layer Security and Wireless Access Control (QSHINE 2017)

Lei Wang, Jenhui Chen, Yang Peng, Lei Zhang

12.12.2018 | Ausgabe 1/2020

Security Performance Analysis of Underlay Cognitive Networks with Helpful Jammer Under Interference from Primary Transmitter

Khuong Ho-Van, Thiem Do-Dac

11.12.2018 | Ausgabe 1/2020

An Auxiliary Antenna Based Inter-User Interference Mitigation Approach in Full-Duplex Wireless Networks

Fei Wu, Chenxing Li, Jiafan Wang, Xiangyin Zhang

18.12.2018 | Ausgabe 1/2020

Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions

Van Nhan Vo, Tri Gia Nguyen, Chakchai So-In, Hung Tran

15.12.2018 | Ausgabe 1/2020

Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers

Mamoun F. Al-Mistarihi, Islam M. Tanash, Fedaa S. Yaseen, Khalid A. Darabkh

23.01.2019 | Ausgabe 1/2020

Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic

Anjana P. Das, Sabu M. Thampi, Jaime Lloret

02.01.2019 | Ausgabe 1/2020

Enhancing Efficient Link Performance in ZigBee Under Cross-Technology Interference

Zhenquan Qin, Yingxiao Sun, Junyu Hu, Wei Zhou, Jialin Liu

03.01.2019 | Ausgabe 1/2020

A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration

Bin Feng, Xiangli Li, Yingmo Jie, Cheng Guo, Huijuan Fu

10.01.2019 | Ausgabe 1/2020

Security and Privacy Issues of UAV: A Survey

Yueyan Zhi, Zhangjie Fu, Xingming Sun, Jingnan Yu

04.01.2019 | Ausgabe 1/2020

Joint Optimization of Latency Monitoring and Traffic Scheduling in Software Defined Heterogeneous Networks

Xu Zhang, Weigang Hou, Lei Guo, Qihan Zhang, Pengxing Guo, Ruijia Li

03.01.2019 | Ausgabe 1/2020

WECAN: an Efficient West-East Control Associated Network for Large-Scale SDN Systems

Haisheng Yu, Heng Qi, Keqiu Li

02.01.2019 | Ausgabe 1/2020

Confusing-Keyword Based Secure Search over Encrypted Cloud Data

Zhangjie Fu, Yangen Liu, Xingming Sun, Yuling Liu, Zuwei Tian

14.12.2018 | Ausgabe 1/2020

Applying Improved Convolutional Neural Network in Image Classification

Zhen-tao Hu, Lin Zhou, Bing Jin, Hai-jiang Liu

15.01.2019 | Ausgabe 1/2020

Performance Specifications for the Roll-Off Factor and Filter Order for Filtered Multitone Modulation in the Maritime VHF Data Exchange System

Qing Hu, Xiaoyue Jing, Jianlin Huang, Linlin Xu

03.01.2020 | Ausgabe 1/2020

Editorial: Security and Privacy Protection for Mobile Applications and Platforms

Victor Sucasas, Georgios Mantas, Saud Althunibat, José-Fernán Martínez Ortega

01.06.2019 | Ausgabe 1/2020 Open Access

Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud

Saqib Rasool, Muddesar Iqbal, Tasos Dagiuklas, Zia Ul-Qayyum, Shancang Li

18.02.2019 | Ausgabe 1/2020

An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices

José Ribeiro, Firooz B. Saghezchi, Georgios Mantas, Jonathan Rodriguez, Simon J. Shepherd, Raed A. Abd-Alhameed

13.02.2019 | Ausgabe 1/2020

A Physical-Layer Key Distribution Mechanism for IoT Networks

Mohanad Alhasanat, Saud Althunibat, Khalid A. Darabkh, Abdullah Alhasanat, Moath Alsafasfeh

28.03.2019 | Correction | Ausgabe 1/2020

Correction to: A Physical-Layer Key Distribution Mechanism for IoT Networks

Mohanad Alhasanat, Saud Althunibat, Khalid A. Darabkh, Abdullah Alhasanat, Moath Alsafasfeh

19.08.2019 | Ausgabe 1/2020

AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis

Anam Mehtab, Waleed Bin Shahid, Tahreem Yaqoob, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal, Malik Najmus Saqib

05.02.2019 | Ausgabe 1/2020

Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers

Van Nhan Vo, Tri Gia Nguyen, Chakchai So-In, Hung Tran, Surasak Sanguanpong

14.02.2019 | Ausgabe 1/2020

Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm

Nedjmeddine Kantour, Sadek Bouroubi

30.04.2019 | Ausgabe 1/2020

IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks

Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou, Hisham Abdalla

17.12.2019 | Ausgabe 1/2020

Editorial: Advanced Techniques for Memory Forensics Analysis

Andrea Lanzi

02.12.2019 | Ausgabe 1/2020

A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises

Mauro Andreolini, Vincenzo Giuseppe Colacino, Michele Colajanni, Mirco Marchetti

19.12.2019 | Ausgabe 1/2020 Open Access

Disk Cluster Allocation Behavior in Windows and NTFS

Martin Karresand, Stefan Axelsson, Geir Olav Dyrkolbotn

01.02.2020 | Ausgabe 1/2020

A Market in Dream: the Rapid Development of Anonymous Cybercrime

Gengqian Zhou, Jianwei Zhuge, Yunqian Fan, Kun Du, Shuqiang Lu

09.01.2020 | Ausgabe 1/2020

Editorial: Reliable Communication for Emerging Wireless Networks

Trung Q. Duong, Chinmoy Kundu, Antonino Masaracchia, Van-Dinh Nguyen

03.07.2019 | Ausgabe 1/2020

Joint User Association and Power Allocation for Millimeter-Wave Ultra-Dense Networks

H. T. Nguyen, H. Murakami, K. Nguyen, K. Ishizu, F. Kojima, J. D. Kim, S. H. Chung, W. J. Hwang

28.06.2019 | Ausgabe 1/2020

Coordinated Handover Signaling and Cross-Layer Adaptation in Heterogeneous Wireless Networking

Fatma A. Al Emam, Mohamed E. Nasr, Sherif E. Kishk

19.06.2019 | Ausgabe 1/2020

Uplink Resource Allocation for Multi-Cluster Internet-of-Things Deployment Underlaying Cellular Networks

Basem M. ElHalawany, Omnia Hashad, Kaishun Wu, Adly S. Tag Eldien

14.06.2019 | Ausgabe 1/2020

Consortium Blockchain-Based Secure Software Defined Vehicular Network

Ning Zhao, Hao Wu, Xiaonan Zhao

06.06.2019 | Ausgabe 1/2020

PBDT: an Energy-Efficient Posture based Data Transmission for Repeated Activities in BAN

Tanmoy Maitra, Sarbani Roy

10.06.2019 | Ausgabe 1/2020

Full-Duplex Enabled Time-Efficient Device Discovery for Public Safety Communications

Zeeshan Kaleem, Ajmal Khan, Syed Ali Hassan, Nguyen-Son Vo, Long D. Nguyen, Hien M. Nguyen

10.06.2019 | Ausgabe 1/2020

Topology Optimizing in FSO-based UAVs Relay Networks for Resilience Enhancement

Zhiqun Gu, Jiawei Zhang, Yuefeng Ji

08.06.2019 | Ausgabe 1/2020

Performance Analysis of Full-Duplex Vehicle-to-Vehicle Relay System over Double-Rayleigh Fading Channels

Ba Cao Nguyen, Xuan Nam Tran, Tran Manh Hoang, Le The Dung

Aktuelle Ausgaben