nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Ad Hoc Networks Editorial for 2018
|
Akyildiz, Ian F. |
|
2019 |
84 |
C |
p. A1-A2 |
artikel |
2 |
Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device
|
Feng, Fang |
|
2019 |
84 |
C |
p. 82-89 |
artikel |
3 |
Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit
|
Gupta, Mohit |
|
2019 |
84 |
C |
p. 56-67 |
artikel |
4 |
A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles
|
Loukas, George |
|
2019 |
84 |
C |
p. 124-147 |
artikel |
5 |
BehaveSense: Continuous authentication for security-sensitive mobile apps using behavioral biometrics
|
Yang, Yafang |
|
2019 |
84 |
C |
p. 9-18 |
artikel |
6 |
Clustering-based device-to-device cache placement
|
Kazez, Ahmet Cihat |
|
2019 |
84 |
C |
p. 170-177 |
artikel |
7 |
Editorial Board
|
|
|
2019 |
84 |
C |
p. ii |
artikel |
8 |
EK-means: A new clustering approach for datasets classification in sensor networks
|
Rida, Mohamad |
|
2019 |
84 |
C |
p. 158-169 |
artikel |
9 |
Energy-efficient multicast routing protocol based on SDN and fog computing for vehicular networks
|
Kadhim, Ahmed Jawad |
|
2019 |
84 |
C |
p. 68-81 |
artikel |
10 |
GRNN and KF framework based real time target tracking using PSOC BLE and smartphone
|
Jondhale, Satish R. |
|
2019 |
84 |
C |
p. 19-28 |
artikel |
11 |
How to obfuscate execution of protocols in an ad hoc radio network?
|
Kardas, Marcin |
|
2019 |
84 |
C |
p. 90-106 |
artikel |
12 |
LANET: Visible-light ad hoc networks
|
Cen, Nan |
|
2019 |
84 |
C |
p. 107-123 |
artikel |
13 |
On the performance of non-orthogonal multiple access in the finite blocklength regime
|
Dosti, Endrit |
|
2019 |
84 |
C |
p. 148-157 |
artikel |
14 |
Performance enhancement for energy harvesting based two-way relay protocols in wireless ad-hoc networks with partial and full relay selection methods
|
Nguyen, Tan N. |
|
2019 |
84 |
C |
p. 178-187 |
artikel |
15 |
Reducing delay and prolonging the lifetime of wireless sensor network using efficient routing protocol based on mobile sink and virtual infrastructure
|
Yarinezhad, Ramin |
|
2019 |
84 |
C |
p. 42-55 |
artikel |
16 |
Relay-pair selection in buffer-aided successive opportunistic relaying using a multi-antenna source
|
Charalambous, Themistoklis |
|
2019 |
84 |
C |
p. 29-41 |
artikel |
17 |
Security analysis for interference management in heterogeneous networks
|
Fang, Dongfeng |
|
2019 |
84 |
C |
p. 1-8 |
artikel |