


default search action
Computer Communications, Volume 191
Volume 191, July 2022
- Weiwei Jin, Juan Sun, Kaikai Chi, Shubin Zhang

:
Deep reinforcement learning based scheduling for minimizing age of information in wireless powered sensor networks. 1-10 - Mohamed Ali Kandi

, Djamel Eddine Kouicem, Messaoud Doudou, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal
:
A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices. 11-25
- Djalel Chefrour

:
Evolution of network time synchronization towards nanoseconds accuracy: A survey. 26-35
- Nour El Houda Bouzouita

, Anthony Busson
, Hervé Rivano
:
FAM: A frame aggregation based method to infer the load level in IEEE 802.11 networks. 36-52
- Pronaya Bhattacharya

, Arpit Shukla, Sudeep Tanwar
, Neeraj Kumar
, Ravi Sharma:
6Blocks: 6G-enabled trust management scheme for decentralized autonomous vehicles. 53-68 - Wanying Guo, Shiraz Ali Wagan, Dong Ryeol Shin, Nawab Muhammad Faseeh Qureshi

:
Cache-Based Green Distributed Cell Dormancy Technique for Dense Heterogeneous Networks. 69-77
- Fillipe Santos

, Roger Immich, Edmundo R. M. Madeira
:
Multimedia services placement algorithm for cloud-fog hierarchical environments. 78-91 - Rim Magdich

, Hanen Jemal, Mounir Ben Ayed
:
A resilient Trust Management framework towards trust related attacks in the Social Internet of Things. 92-107 - Lu Yang

, Yansong Gao, Junqing Zhang, Seyit Camtepe
, Dhammika Jayalath
:
A channel perceiving attack and the countermeasure on long-range IoT physical layer key generation. 108-118 - Haoyu Liu

, Paul Patras:
NetSentry: A deep learning approach to detecting incipient large-scale network attacks. 119-132 - Jue Chen

, Yu-Jie Xiong, Xihe Qiu, Dun He, Hanmin Yin, Changwei Xiao:
A cross entropy based approach to minimum propagation latency for controller placement in Software Defined Network. 133-144
- Mohammed Saleh Ali Muthanna

, Ammar Muthanna, Tu N. Nguyen
, Abdullah S. Alshahrani, Ahmed A. Abd El-Latif
:
Towards optimal positioning and energy-efficient UAV path scheduling in IoT applications. 145-160
- Miriyala Mahesh

, V. P. Harigovindan
:
Hidden terminal aware grouping scheme for IEEE 802.11ah based dense IoT networks. 161-172
- M. Sreenu

, Nitin Gupta
, Chandrashekar Jatoth, Aldosary Saad, Abdullah Alharbi, Lewis Nkenyereye:
Blockchain based secure and reliable Cyber Physical ecosystem for vaccine supply chain. 173-183
- Jianwei Li

, Xiaoming Wang, Qingqing Gan, Fengling Wang:
MFPSE: Multi-user Forward Private Searchable Encryption with dynamic authorization in cloud computing. 184-193 - Kah Meng Chong

, Amizah Malip
:
Bridging unlinkability and data utility: Privacy preserving data publication schemes for healthcare informatics. 194-207 - Weiping Zhu, Jiaojiao Chen, Lin Xu, Jiannong Cao:

Recognition of interactive human groups from mobile sensing data. 208-216 - Muhammad Shahwaiz Afaqui

, Joseph Finnegan, Stephen Brown:
Evaluation of HARQ for improved link efficiency within dense IEEE 802.11 networks. 217-232
- Zhengyu Song

, Xintong Qin
, Yuanyuan Hao
, Tianwei Hou, Jun Wang
, Xin Sun:
A comprehensive survey on aerial mobile edge computing: Challenges, state-of-the-art, and future directions. 233-256
- Shirzad Shahryari, Farzad Tashtarian, Seyed Amin Hosseini Seno

:
CoPaM: Cost-aware VM Placement and Migration for Mobile services in Multi-Cloudlet environment: An SDN-based approach. 257-273 - Parinaz Dastranj, Vahid Solouk, Hashem Kalbkhani:

Energy-efficient deep-predictive airborne base station selection and power allocation for UAV-assisted wireless networks. 274-284
- Zeynab Khodkar

, Jamshid Abouei
:
NOMA-inspired coexistence enabling method in cell-free massive MIMO using opportunistic interference alignment. 285-298
- Luciano Miuccio

, Daniela Panno, Pietro Pisacane, Salvatore Riolo
:
A QoS-aware and channel-aware Radio Resource Management framework for multi-numerology systems. 299-314
- Xiaohui Li

, Hongbin Dong, Xiaodong Yu:
A parameter optimization method in predicting algorithms for smart living. 315-326
- Mohamed Moulay

, Rafael A. García Leiva, Pablo J. Rojo Maroni, Fernando Díez Muñoz
, Vincenzo Mancuso
, Antonio Fernández Anta
:
Automated identification of network anomalies and their causes with interpretable machine learning: The CIAN methodology and TTrees implementation. 327-348
- Tan Deng, Xiaoyong Tang

, Zhiqiang Wu, Xiao Liu, Wei Wei, Zeng Zeng:
An improved DECPSOHDV-Hop algorithm for node location of WSN in Cyber-Physical-Social-System. 349-359
- Jahanzeb Shahid, Muhammad Zia

, Zafar Iqbal, Ahmad S. Almadhor
, Abdul Rehman Javed
:
Cellular automata trust-based energy drainage attack detection and prevention in Wireless Sensor Networks. 360-367 - Om Prakash Singh

, Amit Kumar Singh
, Amrit Kumar Agrawal
, Huiyu Zhou:
SecDH: Security of COVID-19 images based on data hiding with PCA. 368-377
- Kexiang Qian, Yixin Li, Muyijie Zhu, Lihua Yin

, Bin Wang, Xi Luo:
FPMBot: Discovering the frequent pattern of IoT-botnet domain queries in large-scale network. 378-385
- Haotong Cao, Sahil Garg, Georges Kaddoum

, Mohammad Mehedi Hassan, Salman A. AlQahtani
:
Secure and intelligent slice resource allocation in vehicles-assisted cyber physical systems. 386-394
- Adnan Ismail Al-Sulaifanie

, Bayez Khorsheed Al-Sulaifanie, Subir Biswas:
Recent trends in clustering algorithms for wireless sensor networks: A comprehensive review. 395-424
- Bhanu Chander

, Kumaravelan Gopalakrishnan:
A secured and lightweight RFID-tag based authentication protocol with privacy-preserving in Telecare medicine information system. 425-437 - Mukesh Kumar

, Shivansh Mishra
, Bhaskar Biswas
:
PWAF : Path Weight Aggregation Feature for link prediction in dynamic networks. 438-458 - Jihas Khan

, Lillykutty Jacob:
Efficient resource allocation in 5G URLLC with packet duplication based macro-diversity. 459-466 - Lisheng Huang

, Guanling Zhao
, Lu Li
, Fengjun Zhang:
Host identification based on self-similarity of network activity. 467-476 - Majed AlOtaibi:

Hybrid metaheuristic technique for optimal container resource allocation in cloud. 477-485 - Gianmarco Baldini

:
Detection of cybersecurity spoofing attacks in vehicular networks with recurrence quantification analysis. 486-499 - Selma Yahia, Yassine Meraihi, Amar Ramdane-Cherif, Asma Benmessaoud Gabis

, Hossien B. Eldeeb
:
Performance evaluation of vehicular Visible Light Communication based on angle-oriented receiver. 500-509

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














