


default search action
Computer Communications, Volume 193
Volume 193, September 2022
- Ninni Singh, Vinit Kumar Gunjan, Gopal Chaudhary
, Rajesh Kaluri, Nancy Victor, Kuruva Lakshmanna
:
IoT enabled HELMET to safeguard the health of mine workers. 1-9
- Hangyun Tang
, Yanan Qiao, Fan Yang, Bowen Cai, Ruiquan Gao:
dMOBAs: A data marketplace on blockchain with arbitration using side-contracts mechanism. 10-22
- Makarand Mohan Jadhav
, Vivek Deshpande
, Divya Midhunchakkaravarthy, Dattatray S. Waghole:
Improving 5G network performance for OFDM-IDMA system resource management optimization using bio-inspired algorithm with RSM. 23-37
- Rajesh Kumar Shrivastava, Simar Preet Singh
, Mohammad Kamrul Hasan, Gagandeep
, Shayla Islam, Salwani Abdullah, Azana Hafizah Mohd Aman
:
Securing Internet of Things devices against code tampering attacks using Return Oriented Programming. 38-46
- Claudio Fiandrino
, Giulia Attanasio, Marco Fiore, Joerg Widmer:
Toward native explainable and robust AI in 6G networks: Current state, challenges and road ahead. 47-52
- Mohammed M. Alani
:
BotStop : Packet-based efficient and explainable IoT botnet detection using machine learning. 53-62 - Mohammad Shahjalal, Nusrat Farhana, Palash Roy
, Md. Abdur Razzaque, Kuljeet Kaur, Mohammad Mehedi Hassan:
A Binary Gray Wolf Optimization algorithm for deployment of Virtual Network Functions in 5G hybrid cloud. 63-74
- Matthias Van Onsem
, Dieter De Paepe, Sander Vanden Hautte
, Pieter Bonte, Veerle Ledoux, Annelies Lejon, Femke Ongenae
, Dennis Dreesen, Sofie Van Hoecke
:
Hierarchical pattern matching for anomaly detection in time series. 75-81
- Renato Lo Cigno
, Michele Segata
:
Cooperative driving: A comprehensive perspective, the role of communications, and its potential development. 82-93
- Vicente Mayor, Rafael Estepa, Antonio Jose Estepa Alonso, Germán Madinabeitia
:
Deployment of UAV-mounted Access Points for VoWiFi Service with guaranteed QoS. 94-108
- Sabir Ali Changazi
, Asim Dilawar Bakhshi
, Muhammad Yousaf
, Muhammad Hasan Islam, Syed Muhammad Mohsin
, Shahab S. Band, Abdulmajeed Alsufyani
, Sami Bourouis
:
GA-based geometrically optimized topology robustness to improve ambient intelligence for future internet of things. 109-117
- Zied Ben-Houidi
, Dario Rossi
:
Neural language models for network configuration: Opportunities and reality check. 118-125
- Jian Wang
, Guanghui Liu, Guosheng Zhao:
Two-attribute privacy protection method of MCS based on blockchain smart contract. 126-135 - Wenbin Pan, Yi Liu
, Chao Yang:
Adaptive task offloading of rechargeable UAV edge computing network based on double decision value iteration. 136-145 - Anna Triantafyllou
, Dimitrios Zorbas
, Panagiotis G. Sarigiannidis:
Time-slotted LoRa MAC with variable payload support. 146-154 - Muhammad Ateeq, Muhammad Khalil Afzal, Sheraz Anjum, Byung-Seo Kim:
Cognitive quality of service predictions in multi-node wireless sensor networks. 155-167
- Alessandro Cornacchia, Giuseppe Bianchi, Andrea Bianco, Paolo Giaccone:
Staggered HLL: Near-continuous-time cardinality estimation with no overhead. 168-175
- Szymon Szott, Katarzyna Kosek-Szott, Alice Lo Valvo, Ilenia Tinnirello:
Using self-deferral to achieve fairness between Wi-Fi and NR-U in downlink and uplink scenarios. 176-188
- Serge Fdida, Nikos Makris
, Thanasis Korakis, Raffaele Bruno
, Andrea Passarella, Panayiotis Andreou
, Bartosz Belter, Cedric Crettaz
, Walid Dabbous, Yuri Demchenko, Raymond Knopp:
SLICES, a scientific instrument for the networking community. 189-203
- Yantao Cai, Huayi Xiong, Min Chen
, Xing Zhou:
A path characteristics based adaptive subflow switching algorithm for dynamic heterogeneous MPTCP network. 204-213 - Luís Leira
, Miguel Luís
, Susana Sargento
:
Context-based caching in mobile information-centric networks. 214-223
- Mateus Mattos, António Rodrigues, Rui Meireles, Ana Aguiar
:
Geolocation-based sector selection for Vehicle-to-Infrastructure 802.11ad communication. 224-233
- Bernhard Häfner
, Josef Jiru, Henning F. Schepker, Georg Albrecht Schmitt, Jörg Ott:
Preventing failures of cooperative maneuvers among connected and automated vehicles. 234-245
- Souvik Saha, Rajeev Arya
:
ARCMT: Anchor node-based range free cooperative multi trusted secure underwater localization using fuzzifier. 246-265
- Mahnoor Anjum
, Muhammad Abdullah Khan, Syed Ali Hassan
, Haejoon Jung
, Kapal Dev
:
Analysis of time-weighted LoRa-based positioning using machine learning. 266-278
- Anthony Bardou
, Thomas Begin, Anthony Busson:
Analysis of a Multi-Armed Bandit solution to improve the spatial reuse of next-generation WLANs. 279-292
- Bing Jia, Jingbin Liu, Tao Feng, Baoqi Huang, Thar Baker
, Hissam Tawfik:
TTSL: An indoor localization method based on Temporal Convolutional Network using time-series RSSI. 293-301
- Zakir Ahmad Sheikh
, Yashwant Singh
, Pradeep Kumar Singh
, Kayhan Zrar Ghafoor
:
Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope. 302-331
- Xueshu Hong, Xingkong Ma, Shaoyong Li
, Houjie Qiu
, Bo Liu:
A Website Fingerprint defense technology with low delay and controllable bandwidth. 332-345 - Peifa Sun
, Mengda Lyu, Hui Li, Bo Yang, Lizhi Peng:
An early stage convolutional feature extracting method using for mining traffic detection. 346-354
- Shu Yang, Qingzhen Dong
, Laizhong Cui, Xun Chen, Siyu Lei, Yulei Wu, Chengwen Luo:
EC-MASS: Towards an efficient edge computing-based multi-video scheduling system. 355-364
- Sahar Parkouk, Mohammad Torabi
, Saeed Shokrollahi
:
Secrecy performance analysis of amplify-and-forward relay cooperative networks with simultaneous wireless information and power transfer. 365-377 - Wen Liang
, Fei Yan
, Abdullah M. Iliyasu
, Ahmed S. Salama, Kaoru Hirota:
A Hadamard walk model and its application in identification of important edges in complex networks. 378-387
- Nabeil Eltayieb
, Rashad Elhabob
, Muhammad Umar Aftab
, Ramil Kuleev, Manuel Mazzara
, Muhammad Ahmad
:
Secure aggregate signature scheme for smart city applications. 388-395
- Dominik S. Buse
, Georg Echterling, Falko Dressler:
Asynchronous Background Processing for accelerated simulation of wireless communication on multi-core systems. 396-409
- Kedar Nath Singh, Om Prakash Singh
, Amit Kumar Singh
:
ECiS: Encryption prior to compression for digital image security with reduced memory. 410-417

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.