4 July 2022

Special issue published: "Distributed Secure Computing for Smart Mobile IoT Networks"

International Journal of Ad Hoc and Ubiquitous Computing 40(1/2/3) 2022

  • Privacy-preserving smart contracts for fuzzy WordNet-based document representation and clustering using regularised K-means method
  • A dynamic preserving-based WSN framework for medical disease prediction
  • A secure new HRF mechanism for mitigate EDoS attacks
  • Improving QOS in flow controlled CR-ad hoc network with multi criteria routing assisted with cooperative caching and information redundancy
  • Design and implementation of a mobility support adaptive trickle algorithm for RPL in vehicular IoT networks
  • Analytical review on secure communication protocols for 5G and IoT networks
  • F-CHILS maps - a novel encryption scheme for secured medical data transmission using FoG-ban environment
  • A feature ranking-based deep learning secure framework for multi-class leaf disease detection
  • A filter-based machine learning classification framework for cloud-based medical databases
  • Cuckoo search assisted fuzzy logic algorithm for smart WSN routing system
  • Forecasting the decision making process of Supreme Court using hierarchical convolutional neural network
  • An optimised machine learning algorithm for classification of epileptic seizures using EMD-based dynamic features of EEG
  • Secured personal health records using pattern-based verification and two-way polynomial protocol in cloud infrastructure
  • An energy and delay aware routing protocol for wireless sensor network assisted IoT to maximise network lifetime
  • Architecture and routing protocols for internet of vehicles: a review
  • Sliding window assisted mutual redundancy-based feature selection for intrusion detection system
  • An approach using heuristic pheromones-based ACO modelling for green vehicle routing optimisation
  • Secure exchange and effectual verification of educational academic records using hyperledger fabric block chain system
  • A novel bio-inspired approach for VM load balancing and efficient resource management in cloud
  • Efficiency evaluation of HRF mechanism on EDoS attacks in cloud computing services

No comments: