


default search action
Computer Networks, Volume 148
Volume 148, January 2019
- Ian F. Akyildiz, Harry Rudin, Burkhard Stiller:
Computer Networks (COMNET) Editorial for 2018. iii-iv - Hailong Huang
, Andrey V. Savkin, Ming Ding, Chao Huang
:
Mobile robots in wireless sensor networks: A survey on tasks. 1-19 - Jaehyun Park, Jaehee Ha, Brent ByungHoon Kang, Myungchul Kim:
MoHoP: A protocol providing for both mobility management and host privacy. 20-33 - Yazhou Yuan, Xiaoqin Sun, Zhixin Liu, Yuefeng Li, Xinping Guan:
Approach of personnel location in roadway environment based on multi-sensor fusion and activity classification. 34-45 - Yanling Shao, Chunlin Li, Hengliang Tang:
A data replica placement strategy for IoT workflows in collaborative edge and cloud environments. 46-59 - Chi Lin, Yu Sun, Kai Wang, Zhunyue Chen, Bo Xu, Guowei Wu:
Double warning thresholds for preemptive charging scheduling in Wireless Rechargeable Sensor Networks. 72-87 - Rafael B. R. Lourenço
, Gustavo B. Figueiredo
, Massimo Tornatore
, Biswanath Mukherjee:
Data evacuation from data centers in disaster-affected regions through software-defined satellite networks. 88-100 - Yuan Chai
, Xiao-Jun Zeng:
Regional condition-aware hybrid routing protocol for hybrid wireless mesh network. 120-128 - Thi-Minh Nguyen, Michel Minoux, Serge Fdida:
Optimizing resource utilization in NFV dynamic systems: New exact and heuristic approaches. 129-141 - Mojtaba Ghermezcheshmeh
, Vahid Shah-Mansouri
, Mohammad Ghanbari
:
Analysis and performance evaluation of scalable video coding over heterogeneous cellular networks. 151-163 - Fadi Salo
, Ali Bou Nassif
, Aleksander Essex:
Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. 164-175 - Marko Kompara, SK Hafizul Islam
, Marko Hölbl
:
A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs. 196-213 - Parvaneh Asghari
, Amir Masoud Rahmani
, Hamid Haj Seyyed Javadi
:
Internet of Things applications: A systematic review. 241-261 - Neda Petreska
, Hussein Al-Zubaidy, Rudi Knorr, James Gross
:
Bound-based power optimization for multi-hop heterogeneous wireless industrial networks under statistical delay constraints. 262-279
- Francesco Marino
, Corrado Moiso, Matteo Petracca:
Automatic contract negotiation, service discovery and mutual authentication solutions: A survey on the enabling technologies of the forthcoming IoT ecosystems. 176-195
- Konrad-Felix Krentz, Christoph Meinel:
Denial-of-sleep defenses for IEEE 802.15.4 coordinated sampled listening (CSL). 60-71 - Matthias Schunter, Andreas Wespi:
Editorial: Special issue on IoT security and privacy. 280-282 - Mardiana binti Mohamad Noor, Wan Haslina Hassan:
Current research on Internet of Things (IoT) security: A survey. 283-294 - Jianwei Hou, Leilei Qu, Wenchang Shi:
A survey on internet of things security from data perspectives. 295-306 - Zheng Zhou
, Weiming Zhang, Shangbin Li
, Nenghai Yu:
Potential risk of IoT device supporting IR remote control. 307-317 - Kai Yang, Qiang Li
, Limin Sun:
Towards automatic fingerprinting of IoT devices in the cyberspace. 318-327 - Mohamed Eldefrawy
, Ismail Butun
, Nuno Pereira
, Mikael Gidlund
:
Formal security analysis of LoRaWAN. 328-339 - Yi-Ning Liu, Yan-Ping Wang, Xiao-Fen Wang, Zhe Xia, Jingfang Xu:
Privacy-preserving raw data collection without a trusted authority for IoT. 340-348 - Yuxian Liu
, Shaohua Tang, Hao-Tian Wu
, Xinglin Zhang:
RTPT: A framework for real-time privacy-preserving truth discovery on crowdsensed data streams. 349-360 - Umair Sarfraz
, Masoom Alam, Sherali Zeadally, Abid Khan
:
Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions. 361-372
- Huansheng Ning
, Feifei Shi, Tao Zhu
, Qingjuan Li, Liming Chen
:
A novel ontology consistent with acknowledged standards in smart homes. 101-107 - Hao Wang, Guangjie Han
, Lina Zhou, James Adu Ansere
, Wenbo Zhang:
A source location privacy protection scheme based on ring-loop routing for the IoT. 142-150 - Cun Ji
, Chao Zhao, Shijun Liu, Chenglei Yang, Li Pan, Lei Wu, Xiangxu Meng:
A fast shapelet selection algorithm for time series classification. 231-240
- Yannick Léo, Christophe Crespelle, Eric Fleury:
Non-altering time scales for aggregation of dynamic networks into series of graphs. 108-119
- Abdul Wahid, Humera Yasmeen, Munam Ali Shah, Masoom Alam, Sayed Chhattan Shah:
Holistic approach for coupling privacy with safety in VANETs. 214-230

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.