default search action
Computer Communications, Volume 191
Volume 191, July 2022
- Weiwei Jin, Juan Sun, Kaikai Chi, Shubin Zhang:
Deep reinforcement learning based scheduling for minimizing age of information in wireless powered sensor networks. 1-10 - Mohamed Ali Kandi, Djamel Eddine Kouicem, Messaoud Doudou, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal:
A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices. 11-25
- Djalel Chefrour:
Evolution of network time synchronization towards nanoseconds accuracy: A survey. 26-35
- Nour El Houda Bouzouita, Anthony Busson, Hervé Rivano:
FAM: A frame aggregation based method to infer the load level in IEEE 802.11 networks. 36-52
- Pronaya Bhattacharya, Arpit Shukla, Sudeep Tanwar, Neeraj Kumar, Ravi Sharma:
6Blocks: 6G-enabled trust management scheme for decentralized autonomous vehicles. 53-68 - Wanying Guo, Shiraz Ali Wagan, Dong Ryeol Shin, Nawab Muhammad Faseeh Qureshi:
Cache-Based Green Distributed Cell Dormancy Technique for Dense Heterogeneous Networks. 69-77
- Fillipe Santos, Roger Immich, Edmundo R. M. Madeira:
Multimedia services placement algorithm for cloud-fog hierarchical environments. 78-91 - Rim Magdich, Hanen Jemal, Mounir Ben Ayed:
A resilient Trust Management framework towards trust related attacks in the Social Internet of Things. 92-107 - Lu Yang, Yansong Gao, Junqing Zhang, Seyit Camtepe, Dhammika Jayalath:
A channel perceiving attack and the countermeasure on long-range IoT physical layer key generation. 108-118 - Haoyu Liu, Paul Patras:
NetSentry: A deep learning approach to detecting incipient large-scale network attacks. 119-132 - Jue Chen, Yu-Jie Xiong, Xihe Qiu, Dun He, Hanmin Yin, Changwei Xiao:
A cross entropy based approach to minimum propagation latency for controller placement in Software Defined Network. 133-144
- Mohammed Saleh Ali Muthanna, Ammar Muthanna, Tu N. Nguyen, Abdullah S. Alshahrani, Ahmed A. Abd El-Latif:
Towards optimal positioning and energy-efficient UAV path scheduling in IoT applications. 145-160
- Miriyala Mahesh, V. P. Harigovindan:
Hidden terminal aware grouping scheme for IEEE 802.11ah based dense IoT networks. 161-172
- M. Sreenu, Nitin Gupta, Chandrashekar Jatoth, Aldosary Saad, Abdullah Alharbi, Lewis Nkenyereye:
Blockchain based secure and reliable Cyber Physical ecosystem for vaccine supply chain. 173-183
- Jianwei Li, Xiaoming Wang, Qingqing Gan, Fengling Wang:
MFPSE: Multi-user Forward Private Searchable Encryption with dynamic authorization in cloud computing. 184-193 - Kah Meng Chong, Amizah Malip:
Bridging unlinkability and data utility: Privacy preserving data publication schemes for healthcare informatics. 194-207 - Weiping Zhu, Jiaojiao Chen, Lin Xu, Jiannong Cao:
Recognition of interactive human groups from mobile sensing data. 208-216 - Muhammad Shahwaiz Afaqui, Joseph Finnegan, Stephen Brown:
Evaluation of HARQ for improved link efficiency within dense IEEE 802.11 networks. 217-232
- Zhengyu Song, Xintong Qin, Yuanyuan Hao, Tianwei Hou, Jun Wang, Xin Sun:
A comprehensive survey on aerial mobile edge computing: Challenges, state-of-the-art, and future directions. 233-256
- Shirzad Shahryari, Farzad Tashtarian, Seyed-Amin Hosseini-Seno:
CoPaM: Cost-aware VM Placement and Migration for Mobile services in Multi-Cloudlet environment: An SDN-based approach. 257-273 - Parinaz Dastranj, Vahid Solouk, Hashem Kalbkhani:
Energy-efficient deep-predictive airborne base station selection and power allocation for UAV-assisted wireless networks. 274-284
- Zeynab Khodkar, Jamshid Abouei:
NOMA-inspired coexistence enabling method in cell-free massive MIMO using opportunistic interference alignment. 285-298
- Luciano Miuccio, Daniela Panno, Pietro Pisacane, Salvatore Riolo:
A QoS-aware and channel-aware Radio Resource Management framework for multi-numerology systems. 299-314
- Xiaohui Li, Hongbin Dong, Xiaodong Yu:
A parameter optimization method in predicting algorithms for smart living. 315-326
- Mohamed Moulay, Rafael A. García Leiva, Pablo J. Rojo Maroni, Fernando Díez Muñoz, Vincenzo Mancuso, Antonio Fernández Anta:
Automated identification of network anomalies and their causes with interpretable machine learning: The CIAN methodology and TTrees implementation. 327-348
- Tan Deng, Xiaoyong Tang, Zhiqiang Wu, Xiao Liu, Wei Wei, Zeng Zeng:
An improved DECPSOHDV-Hop algorithm for node location of WSN in Cyber-Physical-Social-System. 349-359
- Jahanzeb Shahid, Muhammad Zia, Zafar Iqbal, Ahmad S. Almadhor, Abdul Rehman Javed:
Cellular automata trust-based energy drainage attack detection and prevention in Wireless Sensor Networks. 360-367 - Om Prakash Singh, Amit Kumar Singh, Amrit Kumar Agrawal, Huiyu Zhou:
SecDH: Security of COVID-19 images based on data hiding with PCA. 368-377
- Kexiang Qian, Yixin Li, Muyijie Zhu, Lihua Yin, Bin Wang, Xi Luo:
FPMBot: Discovering the frequent pattern of IoT-botnet domain queries in large-scale network. 378-385
- Haotong Cao, Sahil Garg, Georges Kaddoum, Mohammad Mehedi Hassan, Salman A. AlQahtani:
Secure and intelligent slice resource allocation in vehicles-assisted cyber physical systems. 386-394
- Adnan Ismail Al-Sulaifanie, Bayez Khorsheed Al-Sulaifanie, Subir Biswas:
Recent trends in clustering algorithms for wireless sensor networks: A comprehensive review. 395-424
- Bhanu Chander, Kumaravelan Gopalakrishnan:
A secured and lightweight RFID-tag based authentication protocol with privacy-preserving in Telecare medicine information system. 425-437 - Mukesh Kumar, Shivansh Mishra, Bhaskar Biswas:
PWAF : Path Weight Aggregation Feature for link prediction in dynamic networks. 438-458 - Jihas Khan, Lillykutty Jacob:
Efficient resource allocation in 5G URLLC with packet duplication based macro-diversity. 459-466 - Lisheng Huang, Guanling Zhao, Lu Li, Fengjun Zhang:
Host identification based on self-similarity of network activity. 467-476 - Majed AlOtaibi:
Hybrid metaheuristic technique for optimal container resource allocation in cloud. 477-485 - Gianmarco Baldini:
Detection of cybersecurity spoofing attacks in vehicular networks with recurrence quantification analysis. 486-499 - Selma Yahia, Yassine Meraihi, Amar Ramdane-Cherif, Asma Benmessaoud Gabis, Hossien B. Eldeeb:
Performance evaluation of vehicular Visible Light Communication based on angle-oriented receiver. 500-509
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.