International Journal of Ad Hoc and Ubiquitous Computing
2019 Vol.32 No.1
Pages | Title and author(s) |
1-13 | A challenge-response mechanism for securing online social networks against social botsTorky Mohamed; Meligy Ali; Ibrahim Hani DOI: 10.1504/IJAHUC.2019.101819 |
14-28 | Design of a monitoring and safety system for underground mines using wireless sensor networksCoert Jordaan; Reza Malekian DOI: 10.1504/IJAHUC.2019.101820 |
29-42 | Signal technique for friend or foe detection of intelligent malicious user in cognitive radio networkSaifur Rahman Sabuj; Masanori Hamamura DOI: 10.1504/IJAHUC.2019.101821 |
43-58 | Designing secure and reliable mobile agent based system for reliable MANETMoumita Roy; Chandreyee Chowdhury; Munshi Navid Anjum; Sarmistha Neogy DOI: 10.1504/IJAHUC.2019.101822 |
59-73 | Energy efficient hierarchical multi-path routing protocol to alleviate congestion in WSNG.P. Sunitha; S.M. Dilip Kumar; B.P. Vijay Kumar DOI: 10.1504/IJAHUC.2019.101826 |