default search action
Computer Communications, Volume 198
Volume 198, January 2023
- Mizna Khalid, Sufian Hameed, Abdul Qadir, Syed Attique Shah, Dirk Draheim:
Towards SDN-based smart contract solution for IoT access control. 1-31 - Sella Veluswami Jansi Rani, Iacovos Ioannou, Prabagarane Nagaradjane, Christophoros Christophorou, Vasos Vassiliou, Sai Charan, Sai Prakash, Niel Parekh, Andreas Pitsillides:
Detection of DDoS attacks in D2D communications using machine learning approach. 32-51 - Jianbin Xue, Xiangrui Guan:
Collaborative computation offloading and resource allocation based on dynamic pricing in mobile edge computing. 52-62
- Aoxiang Feng, Dezun Dong, Fei Lei, Junchao Ma, Enda Yu, Ruiqi Wang:
In-network aggregation for data center networks: A survey. 63-76
- Xiaoou Liu, Xiaoyi Chen, Qi Bi, Wei Liang, Jingwen Li, Zheng Zhang:
Blockchain-based distributed operation and incentive solution for P-RAN. 77-84
- Vincenzo Eramo, Tiziana Fiori, Francesco Giacinto Lavacca, Francesco Valente, Andrea Baiocchi, Simone Ciabuschi, Marta Albano, Enrico Cavallini:
A max plus algebra based scheduling algorithm for supporting time triggered services in ethernet networks. 85-97 - Lijuan Weng, Qishan Zhang, Zhibin Lin, Ling Wu, Jin-Hua Zhang:
Integrating interactions between target users and opinion leaders for better recommendations: An opinion dynamics approach. 98-107
- Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha:
An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things. 108-116
- Bruna Toledo Guedes, Diego G. Passos, Fernanda G. O. Passos:
A spectral clustering algorithm for intelligent grouping in Dense Wireless Networks. 117-127 - Houssem Eddin Elbsir, Mohamed Kassab, Sami Bhiri, Mohamed Hedi Bedoui:
Evaluation of LoRaWAN class B performances and its optimization for better support of actuators. 128-139 - Ranbir Dhounchak, Veeraruna Kavitha, Eitan Altman:
Viral marketing branching processes. 140-156 - Javad Dogani, Farshad Khunjush, Mehdi Seydali:
Host load prediction in cloud computing with Discrete Wavelet Transformation (DWT) and Bidirectional Gated Recurrent Unit (BiGRU) network. 157-174 - Yang Guo:
A review of Machine Learning-based zero-day attack detection: Challenges and future directions. 175-185
- Anil Pise, Byungun Yoon, Saurabh Singh:
Enabling Ambient Intelligence of Things (AIoT) healthcare system architectures. 186-194
- Junbo Wang, Xiusong Yang, Songcan Yu, Qing Yuan, Zhuotao Lian, Qinglin Yang:
Road crash risk prediction during COVID-19 for flash crowd traffic prevention: The case of Los Angeles. 195-205
- Xueyuan Duan, Yu Fu, Kun Wang:
Network traffic anomaly detection method based on multi-scale residual classifier. 206-216
- Beibei Cui, Jean-Charles Créput, Lei Zhang:
Self-organizing maps and full GPU parallel approach to graph matching. 217-227
- Théo Docquier, Ye-Qiong Song, Vincent Chevrier, Ludovic Pontnau, Abdelaziz Ahmed Nacer:
Performance evaluation methodologies for Smart Grid Substation Communication Networks: A survey. 228-246
- Mustafa Kara, Hisham R. J. Merzeh, Muhammed Ali Aydin, Hasan Hüseyin Balik:
VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain. 247-261 - P. Satyanarayana, G. Diwakar, B. V. Subbayamma, N. V. Phani Sai Kumar, M. Arun, S. Gopalakrishnan:
Comparative analysis of new meta-heuristic-variants for privacy preservation in wireless mobile adhoc networks for IoT applications. 262-281 - Pooja Verma, Daya Sagar Gupta:
A pairing-free data authentication and aggregation mechanism for Intelligent Healthcare System. 282-296
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.