


default search action
Computer Communications, Volume 191
Volume 191, July 2022
- Weiwei Jin, Juan Sun, Kaikai Chi, Shubin Zhang
:
Deep reinforcement learning based scheduling for minimizing age of information in wireless powered sensor networks. 1-10 - Mohamed Ali Kandi
, Djamel Eddine Kouicem, Messaoud Doudou, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal
:
A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices. 11-25
- Djalel Chefrour
:
Evolution of network time synchronization towards nanoseconds accuracy: A survey. 26-35
- Nour El Houda Bouzouita
, Anthony Busson
, Hervé Rivano
:
FAM: A frame aggregation based method to infer the load level in IEEE 802.11 networks. 36-52
- Pronaya Bhattacharya
, Arpit Shukla, Sudeep Tanwar
, Neeraj Kumar
, Ravi Sharma:
6Blocks: 6G-enabled trust management scheme for decentralized autonomous vehicles. 53-68 - Wanying Guo, Shiraz Ali Wagan, Dong Ryeol Shin, Nawab Muhammad Faseeh Qureshi
:
Cache-Based Green Distributed Cell Dormancy Technique for Dense Heterogeneous Networks. 69-77
- Fillipe Santos
, Roger Immich, Edmundo R. M. Madeira
:
Multimedia services placement algorithm for cloud-fog hierarchical environments. 78-91 - Rim Magdich
, Hanen Jemal, Mounir Ben Ayed
:
A resilient Trust Management framework towards trust related attacks in the Social Internet of Things. 92-107 - Lu Yang
, Yansong Gao, Junqing Zhang, Seyit Camtepe
, Dhammika Jayalath
:
A channel perceiving attack and the countermeasure on long-range IoT physical layer key generation. 108-118 - Haoyu Liu
, Paul Patras:
NetSentry: A deep learning approach to detecting incipient large-scale network attacks. 119-132 - Jue Chen
, Yu-Jie Xiong, Xihe Qiu, Dun He, Hanmin Yin, Changwei Xiao:
A cross entropy based approach to minimum propagation latency for controller placement in Software Defined Network. 133-144
- Mohammed Saleh Ali Muthanna
, Ammar Muthanna, Tu N. Nguyen
, Abdullah S. Alshahrani, Ahmed A. Abd El-Latif
:
Towards optimal positioning and energy-efficient UAV path scheduling in IoT applications. 145-160
- Miriyala Mahesh
, V. P. Harigovindan
:
Hidden terminal aware grouping scheme for IEEE 802.11ah based dense IoT networks. 161-172
- M. Sreenu, Nitin Gupta
, Chandrashekar Jatoth, Aldosary Saad, Abdullah Alharbi, Lewis Nkenyereye:
Blockchain based secure and reliable Cyber Physical ecosystem for vaccine supply chain. 173-183
- Jianwei Li, Xiaoming Wang, Qingqing Gan, Fengling Wang:
MFPSE: Multi-user Forward Private Searchable Encryption with dynamic authorization in cloud computing. 184-193 - Kah Meng Chong
, Amizah Malip
:
Bridging unlinkability and data utility: Privacy preserving data publication schemes for healthcare informatics. 194-207 - Weiping Zhu, Jiaojiao Chen, Lin Xu, Jiannong Cao:
Recognition of interactive human groups from mobile sensing data. 208-216 - Muhammad Shahwaiz Afaqui
, Joseph Finnegan, Stephen Brown:
Evaluation of HARQ for improved link efficiency within dense IEEE 802.11 networks. 217-232
- Zhengyu Song
, Xintong Qin
, Yuanyuan Hao
, Tianwei Hou, Jun Wang
, Xin Sun:
A comprehensive survey on aerial mobile edge computing: Challenges, state-of-the-art, and future directions. 233-256
- Shirzad Shahryari, Farzad Tashtarian, Seyed Amin Hosseini Seno
:
CoPaM: Cost-aware VM Placement and Migration for Mobile services in Multi-Cloudlet environment: An SDN-based approach. 257-273 - Parinaz Dastranj, Vahid Solouk, Hashem Kalbkhani:
Energy-efficient deep-predictive airborne base station selection and power allocation for UAV-assisted wireless networks. 274-284
- Zeynab Khodkar
, Jamshid Abouei
:
NOMA-inspired coexistence enabling method in cell-free massive MIMO using opportunistic interference alignment. 285-298
- Luciano Miuccio
, Daniela Panno, Pietro Pisacane, Salvatore Riolo
:
A QoS-aware and channel-aware Radio Resource Management framework for multi-numerology systems. 299-314
- Xiaohui Li
, Hongbin Dong, Xiaodong Yu:
A parameter optimization method in predicting algorithms for smart living. 315-326
- Mohamed Moulay
, Rafael A. García Leiva, Pablo J. Rojo Maroni, Fernando Díez Muñoz
, Vincenzo Mancuso
, Antonio Fernández Anta
:
Automated identification of network anomalies and their causes with interpretable machine learning: The CIAN methodology and TTrees implementation. 327-348
- Tan Deng, Xiaoyong Tang
, Zhiqiang Wu, Xiao Liu, Wei Wei, Zeng Zeng:
An improved DECPSOHDV-Hop algorithm for node location of WSN in Cyber-Physical-Social-System. 349-359
- Jahanzeb Shahid, Muhammad Zia, Zafar Iqbal, Ahmad S. Almadhor
, Abdul Rehman Javed
:
Cellular automata trust-based energy drainage attack detection and prevention in Wireless Sensor Networks. 360-367 - Om Prakash Singh
, Amit Kumar Singh
, Amrit Kumar Agrawal, Huiyu Zhou:
SecDH: Security of COVID-19 images based on data hiding with PCA. 368-377
- Kexiang Qian, Yixin Li, Muyijie Zhu, Lihua Yin, Bin Wang, Xi Luo:
FPMBot: Discovering the frequent pattern of IoT-botnet domain queries in large-scale network. 378-385
- Haotong Cao, Sahil Garg, Georges Kaddoum, Mohammad Mehedi Hassan, Salman A. AlQahtani
:
Secure and intelligent slice resource allocation in vehicles-assisted cyber physical systems. 386-394
- Adnan Ismail Al-Sulaifanie
, Bayez Khorsheed Al-Sulaifanie, Subir Biswas:
Recent trends in clustering algorithms for wireless sensor networks: A comprehensive review. 395-424
- Bhanu Chander
, Kumaravelan Gopalakrishnan:
A secured and lightweight RFID-tag based authentication protocol with privacy-preserving in Telecare medicine information system. 425-437 - Mukesh Kumar
, Shivansh Mishra
, Bhaskar Biswas
:
PWAF : Path Weight Aggregation Feature for link prediction in dynamic networks. 438-458 - Jihas Khan
, Lillykutty Jacob:
Efficient resource allocation in 5G URLLC with packet duplication based macro-diversity. 459-466 - Lisheng Huang
, Guanling Zhao
, Lu Li
, Fengjun Zhang:
Host identification based on self-similarity of network activity. 467-476 - Majed AlOtaibi:
Hybrid metaheuristic technique for optimal container resource allocation in cloud. 477-485 - Gianmarco Baldini
:
Detection of cybersecurity spoofing attacks in vehicular networks with recurrence quantification analysis. 486-499 - Selma Yahia, Yassine Meraihi, Amar Ramdane-Cherif, Asma Benmessaoud Gabis
, Hossien B. Eldeeb
:
Performance evaluation of vehicular Visible Light Communication based on angle-oriented receiver. 500-509

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.