default search action
Journal of Network and Computer Applications, Volume 234
Volume 234, 2025
- Zheng Zhang, Xiangyu Su, Ji Wu, Claudio J. Tessone, Hao Liao:
Heterogeneous graph representation learning via mutual information estimation for fraud detection. 104046 - Pengbiao Zhao, Yuanjian Zhou, Salman Ijaz, Fazlullah Khan, Jingxue Chen, Bandar Alshawi, Zhen Qin, Md. Arafatur Rahman:
RLL-SWE: A Robust Linked List Steganography Without Embedding for intelligence networks in smart environments. 104053 - Yulong Ma, Yingya Guo, Ruiyu Yang, Huan Luo:
FRRL: A reinforcement learning approach for link failure recovery in a hybrid SDN. 104054 - Abed Alanazi, Abdullah Alqahtani, Shtwai Alsubai, Munish Bhatia:
Blockchain-inspired intelligent framework for logistic theft control. 104055 - José Santos, Efstratios Reppas, Tim Wauters, Bruno Volckaert, Filip De Turck:
Gwydion: Efficient auto-scaling for complex containerized applications in Kubernetes through Reinforcement Learning. 104067 - Silvestre Malta, Pedro Pinto, Manuel Fernández-Veiga:
Optimizing 5G network slicing with DRL: Balancing eMBB, URLLC, and mMTC with OMA, NOMA, and RSMA. 104068 - Fahimeh Dabaghi-Zarandi, Mohammad Mehdi Afkhami, MohammadHossein Ashoori:
Community Detection method based on Random walk and Multi objective Evolutionary algorithm in complex networks. 104070 - Yuxin Xia, Jie Zhang, Ka Lok Man, Yuji Dong:
Handover Authenticated Key Exchange for Multi-access Edge Computing. 104071 - Rakesh Kumar, Mayank Swarnkar:
QuIDS: A Quantum Support Vector machine-based Intrusion Detection System for IoT networks. 104072 - Annamaria Ficara, Hocine Cherifi, Xiaoyang Liu, Luiz Fernando Bittencourt, Maria Fazio:
Complex networks for Smart environments management. 104088
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.