


default search action
Computer Communications, Volume 174
Volume 174, June 2021
- Hui Xie, Zhengyuan Zhang

, Qi Zhang, Shengjun Wei, Changzhen Hu:
HBRSS: Providing high-secure data communication and manipulation in insecure cloud environments. 1-12 - Yevgeni Koucheryavy

, Ekaterina Lisovskaya
, Dmitri Moltchanov
, Roman Kovalchukov
, Andrey Samuylov
:
Quantifying the millimeter wave new radio base stations density for network slicing with prescribed SLAs. 13-27 - Marios Thoma

, Christoforos N. Hadjicostis:
Detection of collaborative misbehaviour in distributed cyber-attacks. 28-41 - Godfrey Kibalya

, Joan Serrat, Juan-Luis Gorricho
, Jonathan Serugunda
, Peiying Zhang:
A multi-stage graph based algorithm for survivable Service Function Chain orchestration with backup resource sharing. 42-60 - Urvashi Garg

, Geeta Sikka, Lalit Kumar Awasthi
:
An ensemble approach for optimization of penetration layout in wide area networks. 61-74
- Jiao Chen, Yongquan Luo, Hongfei Zhang, Weibing Du:

Quality evaluation of lightweight realistic 3D model based on BIM forward design. 75-80
- Md. Rajibul Palas, Md. Rakibul Islam

, Palash Roy
, Md. Abdur Razzaque, Ahmed Alsanad, Salman A. AlQahtani
, Mohammad Mehedi Hassan:
Multi-criteria handover mobility management in 5G cellular network. 81-91
- Lidong Zhang, Mengmeng Zhang, Jian Wang, Xiaowei Li

, Wenxing Zhu:
Internet connected vehicle platoon system modeling and linear stability analysis. 92-100
- Syed Roohullah Jan, Rahim Khan

, Fazlullah Khan
, Mian Ahmad Jan
, Mohammad Dahman Alshehri, Venki Balasubramaniam
, Paramjit S. Sehdev:
Marginal and average weight-enabled data aggregation mechanism for the resource-constrained networks. 101-108 - Wassila Lalouani

, Mohamed F. Younis
, Uthman Baroudi
:
Countering radiometric signature exploitation using adversarial machine learning based protocol switching. 109-121
- Kuo Cheng Chung

, Chun-Hung Chen
, Hsueh-Hsuan Tsai, Ya-Hsueh Chuang
:
Social media privacy management strategies: A SEM analysis of user privacy behaviors. 122-130
- Barnana Baruah, Subhasish Dhal

:
A secure road condition monitoring scheme in cloud based VANET. 131-142
- D. Anitha

, R. A. Karthika
:
DEQLFER - A Deep Extreme Q-Learning Firefly Energy Efficient and high performance routing protocol for underwater communication. 143-153 - Gildásio Antonio de Oliveira Júnior

, Rafael Timóteo de Sousa Jr.
, Robson de Oliveira Albuquerque
, Luis Javier García-Villalba
:
Adversarial attacks on a lexical sentiment analysis classifier. 154-171
- Chang Yun Park

:
Developing an asynchronous NoAck-based full-duplex MAC for IEEE 802.11 networks in a systems approach. 172-189
- Nan Hai

, Daqing Gong, Shifeng Liu:
Ontology knowledge base combined with Bayesian networks for integrated corridor risk warning. 190-204 - Limin Wang, Honghuan Wang, Xuming Han

, Wei Zhou:
A novel adaptive density-based spatial clustering of application with noise based on bird swarm optimization algorithm. 205-214

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














