


default search action
Network, Volume 2
Volume 2, Number 1, 2022
- Marjo Heikkilä

, Jani Suomalainen
, Ossi Saukko
, Tero Kippola, Kalle Lähetkangas
, Pekka Koskela
, Juha Kalliovaara
, Hannu Haapala, Juho Pirttiniemi
, Anastasia Yastrebova
, Harri Posti:
Unmanned Agricultural Tractors in Private Mobile Networks. 1-20 - Hai Trieu Le, Tran Thanh Lam Nguyen

, Tuan Anh Nguyen, Ha Xuan Son, Nghia Duong-Trung
:
BloodChain: A Blood Donation Network Managed by Blockchain Technologies. 21-35 - Miguel Rosendo

, Jorge Granjal
:
Energy-Aware Security Adaptation for Low-Power IoT Applications. 36-52 - Sunghwan Cho

, Gaojie Chen
, Justin P. Coon
, Pei Xiao:
Challenges in Physical Layer Security for Visible Light Communication Systems. 53-65 - Tieming Geng

, Laurent Njilla, Chin-Tser Huang
:
Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment. 66-80 - Pu Gong, Thomas M. Chen, Peng Xu:

Resource-Conserving Protection against Energy Draining (RCPED) Routing Protocol for Wireless Sensor Networks. 83-105 - Shuaibing Lu

, Jie Wu, Jiamei Shi, Pengfan Lu, Juan Fang
, Haiming Liu:
A Dynamic Service Placement Based on Deep Reinforcement Learning in Mobile Edge Computing. 106-122 - Frank Akpan, Gueltoum Bendiab

, Stavros Shiaeles
, Stavros Karamperidis
, Michalis Michaloliakos:
Cybersecurity Challenges in the Maritime Sector. 123-138 - Hassan Mistareehi, D. Manivannan

:
A Low-Overhead Message Authentication and Secure Message Dissemination Scheme for VANETs. 139-152 - Stan Wong

, Bin Han
, Hans D. Schotten
:
5G Network Slice Isolation. 153-167 - Md. Amirul Hasan Shanto

, Binodon
, Amit Karmaker
, Md. Mahfuz Reza, Md. Abir Hossain
:
Cluster-Based Transmission Diversity Optimization in Ultra Reliable Low Latency Communication. 168-189 - Yingyuan Yang

, Jiangnan Li, Sunshin Lee, Xueli Huang, Jinyuan Sun:
EchoIA: A Cloud-Based Implicit Authentication Leveraging User Feedback. 190-202
Volume 2, Number 2, 2022
- Gizem Akman

, Philip Ginzboorg
, Valtteri Niemi
:
Privacy-Aware Access Protocols for MEC Applications in 5G. 203-224 - Issa Dia, Ehsan Ahvar, Gyu Myoung Lee

:
Performance Evaluation of Machine Learning and Neural Network-Based Algorithms for Predicting Segment Availability in AIoT-Based Smart Parking. 225-238 - Muneera Alsayegh, Tarek Moulahi

, Abdulatif Alabdulatif
, Pascal Lorenz
:
Towards Secure Searchable Electronic Health Records Using Consortium Blockchain. 239-256 - Haider W. Oleiwi

, Nagham H. Saeed
, Hamed S. Al-Raweshidy:
Cooperative SWIPT MIMO-NOMA for Reliable THz 6G Communications. 257-269 - Hongliang Mao, Jie Zhong

, Siyuan Yu, Pei Xiao, Xinghao Yang, Gaoyuan Lu:
An Atmospheric Turbulence Compensation Algorithm Based on FSM-DM Cascaded AO Architecture for FSO Communications. 270-288 - Yi-Hang Zhu

, Gilles Callebaut
, Hatice Çalik
, Liesbet Van der Perre
, François Rottenberg
:
Energy Efficient Access Point Placement for Distributed Massive MIMO. 288-310 - Rasmus Rettig

, Christoph Schöne, Frederik Fröhlich, Christopher Niemöller
:
Method for Systematic Assessment of Mobile Network Coverage for Logistic Applications on the German Highway. 311-328 - Muntadher Alsabah

, Marwah Abdulrazzaq Naser
, Basheera M. Mahmmod
, Sadiq H. Abdulhussain
:
A Computationally Efficient Gradient Algorithm for Downlink Training Sequence Optimization in FDD Massive MIMO Systems. 329-349 - Konstantinos I. Roumeliotis

, Nikolaos D. Tselikas
:
Evaluating Progressive Web App Accessibility for People with Disabilities. 350-369
Volume 2, Number 3, 2022
- Ralph Voltaire J. Dayot

, In-Ho Ra
, Hyung-Jin Kim:
A Deep Contextual Bandit-Based End-to-End Slice Provisioning Approach for Efficient Allocation of 5G Network Resources. 370-388 - Tomofumi Matsuzawa

, Kyosuke Ichikawa:
Implementation and Evaluation of HTTP/3 Connectivity Check Using Happy Eyeballs Algorithm. 389-397 - Zongze Li

, Shuai Wang, Qingfeng Lin, Yang Li
, Miaowen Wen
, Yik-Chung Wu, H. Vincent Poor
:
Phase Shift Design in RIS Empowered Wireless Networks: From Optimization to AI-Based Methods. 398-418 - Ed Kamya Kiyemba Edris

, Mahdi Aiash
, Jonathan Loo
:
An Introduction of a Modular Framework for Securing 5G Networks and Beyond. 419-439 - Dennis Krummacker

, Benedikt Veith
, Christoph Fischer
, Hans Dieter Schotten
:
Analysis of 5G Channel Access for Collaboration with TSN Concluding at a 5G Scheduling Mechanism. 440-455 - Stavros Karageorgiou

, Vasileios Karyotis
:
Markov-Based Malware Propagation Modeling and Analysis in Multi-Layer Networks. 456-478
Volume 2, Number 4, 2022
- Gia Khanh Tran

, Masanori Ozasa, Jin Nakazato
:
NFV/SDN as an Enabler for Dynamic Placement Method of mmWave Embedded UAV Access Base Stations. 479-499 - Ahmed Osama Basil Al-Mashhadani

, Mu Mu
, Ali Al-Sharbaz:
Quality of Experience Experimentation Prediction Framework through Programmable Network Management. 500-518 - Babatunde Ojetunde

, Naoto Egashira, Kenta Suzuki, Takuya Kurihara, Kazuto Yano
, Yoshinori Suzuki:
A Multimodel-Based Approach for Estimating Cause of Scanning Failure and Delay in IoT Wireless Network. 519-544 - John Kafke, Thiago Viana

:
Call Me Maybe: Using Dynamic Protocol Switching to Mitigate Denial-of-Service Attacks on VoIP Systems. 545-567 - Maria Papathanasaki

, Panagiotis Fountas
, Kostas Kolomvatsos
:
An Uncertainty-Driven Proactive Self-Healing Model for Pervasive Applications. 568-582 - Doaa N. Mhawi

, Haider W. Oleiwi
, Nagham H. Saeed
, Heba L. Al-Taie:
An Efficient Information Retrieval System Using Evolutionary Algorithms. 583-605 - Shaharyar Khan, Stuart E. Madnick

:
Protecting Chiller Systems from Cyberattack Using a Systems Thinking Approach. 606-627 - Garett T. Fox

, Rajendra V. Boppana
:
Detection of Malicious Network Flows with Low Preprocessing Overhead. 628-642 - Tariq Daradkeh

, Anjali Agarwal:
Cloud Workload and Data Center Analytical Modeling and Optimization Using Deep Machine Learning. 643-669 - Radheshyam Singh

, José Soler
, Tidiane Sylla, Léo Mendiboure
, Marion Berbineau:
Coexistence of Railway and Road Services by Sharing Telecommunication Infrastructure Using SDN-Based Slicing: A Tutorial. 670-706

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














