


default search action
Computer Networks, Volume 262
Volume 262, 2025
- Jisheng Dong
, Qingni Shen, Junkai Liang
, Cong Li, Xinyu Feng
, Yuejian Fang
:
A lattice-based privacy-preserving decentralized multi-party payment scheme. 111129 - Thi-Thu-Huong Le
, Shinwook Heo, Jaehan Cho, Howon Kim:
DDoSBERT: Fine-tuning variant text classification bidirectional encoder representations from transformers for DDoS detection. 111150 - Xianglong Li
, Kaiwei Mo, Zongpeng Li
, Hong Xu
:
Dynamic pricing and scheduling in LEO satellite networks. 111152 - Chandra Sukanya Nandyala, Ho-Shin Cho
:
AUV-aided isolated sub-network prevention for reliable data collection by underwater wireless sensor networks. 111154 - Ying Du
, Yilong Li
, Pu Cheng
, Zhijie Han, Yanan Wang
:
UGL: A comprehensive hybrid model integrating GCN and LSTM for enhanced intrusion detection in UAV controller area networks. 111157 - Antonio Calagna
, Stefano Ravera
, Carla-Fabiana Chiasserini
:
Enabling efficient collection and usage of network performance metrics at the edge. 111158 - Subhendu Ghosh
, Aneek Adhya:
Soft failure detection and identification in optical networks using cascaded deep learning model. 111159 - Hooman Alavizadeh
, Ahmad Salehi S.
, A. S. M. Kayes
, Wenny Rahayu, Tharam S. Dillon:
Social network botnet attack mitigation model for cloud. 111160 - Zinuo Yin, Hongchang Chen, Hailong Ma, Tao Hu
, Luxin Bai:
CAEAID: An incremental contrast learning-based intrusion detection framework for IoT networks. 111161 - Johannes Loevenich
, Erik Adler, Tobias Hürten
, Roberto Rigolin F. Lopes
:
Design and evaluation of an Autonomous Cyber Defence agent using DRL and an augmented LLM. 111162 - Junbin Liang, Qiao He:
Joint optimization of VNF deployment and UAV trajectory planning in Multi-UAV-enabled mobile edge networks. 111163 - Zekang Wang
, Fuxiang Yuan
, Ruixiang Li
, Meng Zhang
, Xiangyang Luo
:
Hidden AS link prediction based on random forest feature selection and GWO-XGBoost model. 111164 - Yongqing Cai
, Dianjie Lu
, Jing Chen
, Guijuan Zhang:
MAID: Mobility-aware information dissemination in mobile IoT using temporal point processes. 111173 - Mohammad Parsa Toopchinezhad, Mahmood Ahmadi
:
Machine learning approaches for active queue management: A survey, taxonomy, and future directions. 111174 - Lianming Zhang, Shuqiang Peng, Pingping Dong
:
SK-CFR: Rerouting critical flows through discrete soft actor-critic within the KP-GNN framework. 111175 - Salma Najjar, Michael David, William Derigent, Ahmed Zouinkhi
:
Dynamic reconfiguration of wireless sensor networks: A survey. 111176 - Daniela Pinto
, Ivone Amorim
, Eva Maia
, Isabel Praça
:
A review on intrusion detection datasets: tools, processes, and features. 111177 - Usman Ali Gulzari
, Waqar Farooq, Syed Nasir Mehmood Shah, Naveed Ahmad, Hessam S. Sarjoughian, Iftikhar Ahmed Khan, Sheraz Anjum:
The Scalable Octagonal-Cross-By-Pass-Torus topology for the on-chip-communication. 111178 - Wei Liu, Wentao Cui
, Bin Wang
, Heng Pan, Wei She, Zhao Tian
:
Decentralized traffic detection utilizing blockchain-federated learning with quality-driven aggregation. 111179 - Ehzaz Mustafa
, Junaid Shuja, Faisal Rehman, Abdallah Namoun, Muhammad Bilal, Kashif Bilal
:
Deep Reinforcement Learning and SQP-driven task offloading decisions in vehicular edge computing networks. 111180 - Mario Pérez-Gomariz
, Fernando Cerdán-Cartagena
, Jess García:
LM-Hunter: An NLP-powered graph method for detecting adversary lateral movements in APT cyber-attacks at scale. 111181 - Edson M. Cruz
, J. R. D. S. Júnior
, Y. H. J. Souza, G. L. S. S. Jesus, Maycon Leone Maciel Peixoto
:
ArchW3: An adaptive blockchain wallet architecture for Web3 applications. 111182 - Fei Zhu
, Lin You
, Jixiang Wang, Lei Li:
P-HotStuff: Parallel BFT algorithm with throughput insensitive to propagation delay. 111183 - Ernest Akpaku
, Jinfu Chen
, Mukhtar Ahmed
, Francis Kwadzo Agbenyegah
, Willian Leslie Brown-Acquaye
:
RAGN: Detecting unknown malicious network traffic using a robust adaptive graph neural network. 111184 - Selim Yilmaz
:
Enhancing IoT security: A competitive coevolutionary strategy for detecting RPL attacks in challenging attack environments. 111185 - Qianhui Yu
, Hai Xue
, Celimuge Wu
, Ya Liu
, Wunan Guo
:
Yardstick-Stackelberg pricing-based incentive mechanism for Federated Learning in Edge Computing. 111186 - Yunchuan Kang
, Houbing Herbert Song, Tian Wang, Shaobo Zhang, Mianxiong Dong, Anfeng Liu
:
A trust and bundling-based task allocation scheme to enhance completion rate and data quality for mobile crowdsensing. 111189 - Amir Fathalizadeh, Vahideh Moghtadaiee
, Mina Alishahi:
A survey and future outlook on indoor location fingerprinting privacy preservation. 111199 - Woo-Hyeok Jang
, Seung-Jae Han:
Collision avoidance by mitigating uncertain packet loss in multi-hop wireless IoT networks. 111205 - Fang Yang
, Tao Ma, Chunlai Ma, Nina Shu, Chao Chang, Chunsheng Liu, Tao Wu, Xingkui Du:
GenNP: A low-threshold and powerful network performance data generator. 111209 - Xiaoling Yu
, Yuntao Wang
, Xin Huang
:
Quantum-resistant ring signature-based authentication scheme against secret key exposure for VANETs. 111213

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.