default search action
Computer Networks, Volume 201
Volume 201, December 2021
- Qian Mao, Lin Zhang, Fei Hu, Elizabeth Serena Bentley, Sunil Kumar:
Deep Learning (DL)-based adaptive transport layer control in UAV Swarm Networks. 108511
- Rubina Akter, Van-Sang Doan, Jae-Min Lee, Dong-Seong Kim:
CNN-SSDI: Convolution neural network inspired surveillance system for UAVs detection and identification. 108519
- Yuyu Zhao, Guang Cheng, Yu Duan, Zhouchao Gu, Yuyang Zhou, Lu Tang:
Secure IoT edge: Threat situation awareness based on network traffic. 108525 - Baolin Ma, Chao Yang, Mingzhe Chen, Jianfeng Ma:
GramMatch: An automatic protocol feature extraction and identification system. 108528
- Chuan Yu, Shuhui Chen, Fei Wang, Ziling Wei:
Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers. 108532
- Zhishuo Zhang, Shijie Zhou:
A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things. 108553 - Massimo Candela, Valerio Luconi, Alessio Vecchio:
A worldwide study on the geographic locality of Internet routes. 108555 - Noelia Pérez Palma, Falko Dressler, Vincenzo Mancuso:
Precise: Predictive Content Dissemination Scheme exploiting realistic mobility patterns. 108556 - Roberto Torre Arranz, Muhammad Tayyab, Georgios P. Koudouridis, Xavier Gelabert, Riccardo Bassoli, Frank H. P. Fitzek:
Power efficient mobile small cell placement for network-coded cooperation in UDNs. 108559 - Fatemeh Davami, Sahar Adabi, Ali Rezaee, Amir Masoud Rahmani:
Distributed scheduling method for multiple workflows with parallelism prediction and DAG prioritizing for time constrained cloud applications. 108560
- Lu Jie, Hongchang Chen, Penghao Sun, Tao Hu, Zhen Zhang:
OrderSketch: An Unbiased and Fast Sketch for Frequency Estimation of Data Streams. 108563
- Syed Muhammad Atif, Nicolas Gillis, Sameer Qazi, Imran Naseem:
Structured nonnegative matrix factorization for traffic flow estimation of large cloud networks. 108564 - Bin Wang, Fagui Liu, Weiwei Lin, Zhenjiang Ma, Dishi Xu:
Energy-efficient collaborative optimization for VM scheduling in cloud computing. 108565
- Fatima Salahdine, Johnson Opadere, Qiang Liu, Tao Han, Ning Zhang, Shaohua Wu:
A survey on sleep mode techniques for ultra-dense networks in 5G and beyond. 108567 - Babak Farhadi, Amir Masoud Rahmani, Parvaneh Asghari, Mehdi Hosseinzadeh:
Friendship selection and management in social internet of things: A systematic review. 108568
- Michele Garetto, Emilio Leonardi, Giovanni Neglia:
Content placement in networks of similarity caches. 108570
- Bing Qian, Shun Lu:
Detection of mobile network abnormality using deep learning models on massive network measurement data. 108571
- Shuang Liang, Zhiyi Fang, Geng Sun, Chi Lin, Jiahui Li, Songyang Li, Aimin Wang:
Charging UAV deployment for improving charging performance of wireless rechargeable sensor networks via joint optimization approach. 108573 - An Braeken:
Device-to-device group authentication compatible with 5G AKA protocol. 108575 - Ye Yang, Haiyang Jiang, Guangxing Zhang, Xin Wang, Yilong Lv, Xing Li, Serge Fdida, Gaogang Xie:
S2H: Hypervisor as a setter within Virtualized Network I/O for VM isolation on cloud platform. 108577 - T. Tolga Sari, Gökhan Seçinti:
Chain RTS/CTS scheme with Opportunistic Channel Allocation. 108581
- Khaled Abid, Hicham Lakhlef, Abdelmadjid Bouabdallah:
A survey on recent contention-free MAC protocols for static and mobile wireless decentralized networks in IoT. 108583
- Abhishek Sharma, Amik Garg, Sanjay Kumar Sharma, Vibhav Kumar Sachan, Parvin Kumar:
Performance optimization for UWB communication network under IEEE 802.15.4a channel conditions. 108585
- Qiuning Ren, Chao Yang, Jianfeng Ma:
App identification based on encrypted multi-smartphone sources traffic fingerprints. 108590
- Raniyah Wazirali, Rami Ahmad, Ashraf Abdel-Karim Helal Abu-Ein:
Sustaining accurate detection of phishing URLs using SDN and feature selection approaches. 108591
- Yuan Liu, Yixiao Lan, Boyang Li, Chunyan Miao, Zhihong Tian:
Proof of Learning (PoLe): Empowering neural network training with consensus building on blockchains. 108594
- Sanjeev Kumar, B. Janet:
Distinguishing malicious programs based on visualization and hybrid learning algorithms. 108595 - Swapnil Sadashiv Shinde, Dania Marabissi, Daniele Tarchi:
A network operator-biased approach for multi-service network function placement in a 5G network slicing architecture. 108598 - Luciano Miuccio, Daniela Panno, Salvatore Riolo:
A DNN-based estimate of the PRACH traffic load for massive IoT scenarios in 5G networks and beyond. 108608 - Carlo Kleber da Silva Rodrigues:
Analyzing Blockchain integrated architectures for effective handling of IoT-ecosystem transactions. 108610 - Laurens D'hooge, Miel Verkerken, Tim Wauters, Bruno Volckaert, Filip De Turck:
Hierarchical feature block ranking for data-efficient intrusion detection modeling. 108613
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.