Found: 36
Select item for more details and to access through your institution.
Disk Cluster Allocation Behavior in Windows and NTFS.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 248, doi. 10.1007/s11036-019-01441-1
- By:
- Publication type:
- Article
Editorial: Reliable Communication for Emerging Wireless Networks.
- Published in:
- 2020
- By:
- Publication type:
- Editorial
A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 236, doi. 10.1007/s11036-019-01442-0
- By:
- Publication type:
- Article
A Market in Dream: the Rapid Development of Anonymous Cybercrime.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 259, doi. 10.1007/s11036-019-01440-2
- By:
- Publication type:
- Article
Editorial: Advanced Techniques for Memory Forensics Analysis.
- Published in:
- 2020
- By:
- Publication type:
- Editorial
Editorial: Security and Privacy Protection for Mobile Applications and Platforms.
- Published in:
- 2020
- By:
- Publication type:
- Editorial
Performance Analysis of Full-Duplex Vehicle-to-Vehicle Relay System over Double-Rayleigh Fading Channels.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 363, doi. 10.1007/s11036-019-01291-x
- By:
- Publication type:
- Article
Topology Optimizing in FSO-based UAVs Relay Networks for Resilience Enhancement.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 350, doi. 10.1007/s11036-019-01290-y
- By:
- Publication type:
- Article
Full-Duplex Enabled Time-Efficient Device Discovery for Public Safety Communications.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 341, doi. 10.1007/s11036-019-01289-5
- By:
- Publication type:
- Article
Editorial: Physical Layer Security and Wireless Access Control (QSHINE 2017).
- Published in:
- 2020
- By:
- Publication type:
- Editorial
Uplink Resource Allocation for Multi-Cluster Internet-of-Things Deployment Underlaying Cellular Networks.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 300, doi. 10.1007/s11036-019-01288-6
- By:
- Publication type:
- Article
Joint User Association and Power Allocation for Millimeter-Wave Ultra-Dense Networks.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 274, doi. 10.1007/s11036-019-01286-8
- By:
- Publication type:
- Article
Consortium Blockchain-Based Secure Software Defined Vehicular Network.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 314, doi. 10.1007/s11036-019-01285-9
- By:
- Publication type:
- Article
Coordinated Handover Signaling and Cross-Layer Adaptation in Heterogeneous Wireless Networking.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 285, doi. 10.1007/s11036-019-01284-w
- By:
- Publication type:
- Article
PBDT: an Energy-Efficient Posture based Data Transmission for Repeated Activities in BAN.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 328, doi. 10.1007/s11036-019-01287-7
- By:
- Publication type:
- Article
Correction to: A Physical-Layer Key Distribution Mechanism for IoT Networks.
- Published in:
- 2020
- By:
- Publication type:
- Correction Notice
Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 153, doi. 10.1007/s11036-019-01221-x
- By:
- Publication type:
- Article
An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 164, doi. 10.1007/s11036-019-01220-y
- By:
- Publication type:
- Article
AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 180, doi. 10.1007/s11036-019-01248-0
- By:
- Publication type:
- Article
Confusing-Keyword Based Secure Search over Encrypted Cloud Data.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 125, doi. 10.1007/s11036-018-1195-8
- By:
- Publication type:
- Article
A Physical-Layer Key Distribution Mechanism for IoT Networks.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 173, doi. 10.1007/s11036-019-01219-5
- By:
- Publication type:
- Article
Performance Specifications for the Roll-Off Factor and Filter Order for Filtered Multitone Modulation in the Maritime VHF Data Exchange System.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 142, doi. 10.1007/s11036-018-1197-6
- By:
- Publication type:
- Article
Applying Improved Convolutional Neural Network in Image Classification.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 133, doi. 10.1007/s11036-018-1196-7
- By:
- Publication type:
- Article
Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 193, doi. 10.1007/s11036-019-01217-7
- By:
- Publication type:
- Article
Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 211, doi. 10.1007/s11036-019-01216-8
- By:
- Publication type:
- Article
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 223, doi. 10.1007/s11036-019-01215-9
- By:
- Publication type:
- Article
Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 55, doi. 10.1007/s11036-018-1192-y
- By:
- Publication type:
- Article
Joint Optimization of Latency Monitoring and Traffic Scheduling in Software Defined Heterogeneous Networks.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 102, doi. 10.1007/s11036-018-1191-z
- By:
- Publication type:
- Article
WECAN: an Efficient West-East Control Associated Network for Large-Scale SDN Systems.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 114, doi. 10.1007/s11036-018-1194-9
- By:
- Publication type:
- Article
Security and Privacy Issues of UAV: A Survey.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 95, doi. 10.1007/s11036-018-1193-x
- By:
- Publication type:
- Article
Enhancing Efficient Link Performance in ZigBee Under Cross-Technology Interference.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 68, doi. 10.1007/s11036-018-1190-0
- By:
- Publication type:
- Article
A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 82, doi. 10.1007/s11036-018-1186-9
- By:
- Publication type:
- Article
Security Performance Analysis of Underlay Cognitive Networks with Helpful Jammer Under Interference from Primary Transmitter.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 4, doi. 10.1007/s11036-018-1185-x
- By:
- Publication type:
- Article
Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 42, doi. 10.1007/s11036-018-1189-6
- By:
- Publication type:
- Article
Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 23, doi. 10.1007/s11036-018-1188-7
- By:
- Publication type:
- Article
An Auxiliary Antenna Based Inter-User Interference Mitigation Approach in Full-Duplex Wireless Networks.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 16, doi. 10.1007/s11036-018-1187-8
- By:
- Publication type:
- Article