Volume 36, Number 4, 2021
Security analysis of image CAPTCHA using a mask R-CNN-based attack model.

Vijaypal Singh Rathor Bharat Garg Mandar Patil G. K. Sharma

Optimised routing algorithm in low Earth orbit satellite networks.

Izzat Ghaith Mohammed Hussein

Coordinated sensing coverage optimisation in sensor networks using RSSI.

Qingdong Huang Yun Zhou Sen Hao Xueqian Yao Miao Zhang

Multi-cluster flying ad-hoc network for disaster monitoring applications.

Abhishek Joshi Sarang C. Dhongdi Narayan Manjarekar K. R. Anupama

An overview of continuous device-to-device authentication techniques for the internet of things.

Arwa Badhib Asma Cherif Suhair Alshehri


Volume 36, Number 3, 2021
On fast Fourier transform-based decoding of Reed-Solomon codes.

Yunghsiang S. Han Chao Chen Sian-Jheng Lin Baoming Bai

Energy efficient power allocation with antenna selection for interference alignment-based MIMO-OFDM cognitive radio networks.

P. Reba

An e-healthcare authentication protocol employing cloud computing.

Prerna Mohit Ruhul Amin G. P. Biswas

Propagation models and their effect on the congestion control in vehicular ad hoc network.

Swati Sharma Sandeep Harit

Provably secure authenticated content key distribution framework for IoT-enabled enterprise digital rights management systems.

Saurabh Rana Dheerendra Mishra


Volume 36, Number 2, 2021
Monitoring in fog computing: state-of-the-art and research challenges.

Haftay Gebreslasie Abreha Carlos J. Bernardos Antonio de la Oliva Luca Cominardi Arturo Azcorra

A robust guaranteed time slots allotment scheme for real-time and reliable communication in WBANs.

Gulshan Soni Kandasamy Selvaradjou

Mobility modelling for urban traffic surveillance by a team of unmanned aerial vehicles.

Farooq Ahmed Haroon Mahmood Yasir Niaz

Detection of phishing attacks using probabilistic neural network with a novel training algorithm for reduced Gaussian kernels and optimal smoothing parameter adaptation for mobile web services.

S. Priya S. Selvakumar


Volume 36, Number 1, 2021
Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm.

Ammar Almomani Ahmad Al Nawasrah Mohammad Alauthman Mohammed Azmi Al-Betar Farid Meziane

Energy-efficient fault-tolerant scheduling in a fog-based smart monitoring application.

Ahmad Sharif Mohsen Nickray Ali Shahidinejad

An intrusion detection model using improved convolutional deep belief networks for wireless sensor networks.

Weimin Wen Cuijuan Shang Zaixiu Dong Huan-Chao Keh Diptendu Sinha Roy

Approximation algorithms for profit maximisation in multicast D2D networks.

Jagadeesha R. Bhat Jang-Ping Sheu Wing-Kai Hon Cian-You Yang

Outage probability analysis for relay-based cognitive radio network.

Perarasi T. Sambantham Ganesan Nagarajan