


default search action
Journal of Network and Computer Applications, Volume 126
Volume 126, January 2019
- Ming Tao, Wenhong Wei, Shuqiang Huang:
Location-based trustworthy services recommendation in cooperative-communication-enabled Internet of Vehicles. 1-11 - Ahmed Aziz
, Karan Singh
, Walid Osamy
, Ahmed M. Khedr:
Effective algorithm for optimizing compressive sensing in IoT and periodic monitoring applications. 12-28
- Xiaosong Zhang, Liehuang Zhu, Xianmin Wang
, Changyou Zhang, Hongfei Zhu, Yu-an Tan:
A packet-reordering covert channel over VoLTE voice and video traffics. 29-38 - Tong Li, Chongzhi Gao, Liaoliang Jiang, Witold Pedrycz, Jian Shen
:
Publicly verifiable privacy-preserving aggregation and its application in IoT. 39-44 - Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan
, Neeraj Kumar
:
A survey on privacy protection in blockchain system. 45-58 - Seema Kharb
, Anita Singhrova
:
A survey on network formation and scheduling algorithms for time slotted channel hopping in industrial networks. 59-87 - Huaqing Lin, Zheng Yan
, Yulong Fu:
Adaptive security-related data collection with context awareness. 88-103
- EmadelDin A. Mazied, Mustafa Y. ElNainay
, Mohammad J. Abdel-Rahman
, Scott F. Midkiff, Mohamed R. M. Rizk
, Hesham A. Rakha
, Allen B. MacKenzie
:
The wireless control plane: An overview and directions for future research. 104-122 - Karim Akilal, Hachem Slimani
, Mawloud Omar:
A robust trust inference algorithm in weighted signed social networks based on collaborative filtering and agreement as a similarity metric. 123-132 - Cleverton Vicentini, Altair Olivo Santin
, Eduardo Viegas
, Vilmar Abreu:
SDN-based and multitenant-aware resource provisioning mechanism for cloud-based big data streaming. 133-149 - Abderazek Seba
, Nadia Nouali-Taboudjemat, Nadjib Badache, Hamida Seba:
A review on security challenges of wireless communications in disaster emergency response and crisis management situations. 150-161 - Fatemeh Shabestari
, Amir Masoud Rahmani
, Nima Jafari Navimipour
, Sam Jabbehdari
:
A taxonomy of software-based and hardware-based approaches for energy efficiency management in the Hadoop. 162-177

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.