


default search action
Computer Communications, Volume 198
Volume 198, January 2023
- Mizna Khalid

, Sufian Hameed
, Abdul Qadir, Syed Attique Shah
, Dirk Draheim
:
Towards SDN-based smart contract solution for IoT access control. 1-31 - Sella Veluswami Jansi Rani

, Iacovos Ioannou
, Prabagarane Nagaradjane, Christophoros Christophorou
, Vasos Vassiliou
, Sai Charan, Sai Prakash, Niel Parekh, Andreas Pitsillides:
Detection of DDoS attacks in D2D communications using machine learning approach. 32-51 - Jianbin Xue, Xiangrui Guan:

Collaborative computation offloading and resource allocation based on dynamic pricing in mobile edge computing. 52-62
- Aoxiang Feng, Dezun Dong, Fei Lei, Junchao Ma, Enda Yu, Ruiqi Wang:

In-network aggregation for data center networks: A survey. 63-76
- Xiaoou Liu, Xiaoyi Chen, Qi Bi, Wei Liang, Jingwen Li, Zheng Zhang:

Blockchain-based distributed operation and incentive solution for P-RAN. 77-84
- Vincenzo Eramo

, Tiziana Fiori
, Francesco Giacinto Lavacca, Francesco Valente
, Andrea Baiocchi, Simone Ciabuschi, Marta Albano
, Enrico Cavallini
:
A max plus algebra based scheduling algorithm for supporting time triggered services in ethernet networks. 85-97 - Lijuan Weng, Qishan Zhang, Zhibin Lin

, Ling Wu
, Jin-Hua Zhang
:
Integrating interactions between target users and opinion leaders for better recommendations: An opinion dynamics approach. 98-107
- Amir Namavar Jahromi

, Hadis Karimipour
, Ali Dehghantanha:
An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things. 108-116
- Bruna Toledo Guedes

, Diego G. Passos
, Fernanda G. O. Passos
:
A spectral clustering algorithm for intelligent grouping in Dense Wireless Networks. 117-127 - Houssem Eddin Elbsir

, Mohamed Kassab, Sami Bhiri, Mohamed Hedi Bedoui
:
Evaluation of LoRaWAN class B performances and its optimization for better support of actuators. 128-139 - Ranbir Dhounchak

, Veeraruna Kavitha
, Eitan Altman:
Viral marketing branching processes. 140-156 - Javad Dogani

, Farshad Khunjush
, Mehdi Seydali:
Host load prediction in cloud computing with Discrete Wavelet Transformation (DWT) and Bidirectional Gated Recurrent Unit (BiGRU) network. 157-174 - Yang Guo

:
A review of Machine Learning-based zero-day attack detection: Challenges and future directions. 175-185
- Anil Pise, Byungun Yoon

, Saurabh Singh:
Enabling Ambient Intelligence of Things (AIoT) healthcare system architectures. 186-194
- Junbo Wang, Xiusong Yang, Songcan Yu

, Qing Yuan
, Zhuotao Lian, Qinglin Yang:
Road crash risk prediction during COVID-19 for flash crowd traffic prevention: The case of Los Angeles. 195-205
- Xueyuan Duan, Yu Fu, Kun Wang:

Network traffic anomaly detection method based on multi-scale residual classifier. 206-216
- Beibei Cui, Jean-Charles Créput, Lei Zhang:

Self-organizing maps and full GPU parallel approach to graph matching. 217-227
- Théo Docquier

, Ye-Qiong Song, Vincent Chevrier, Ludovic Pontnau, Abdelaziz Ahmed Nacer:
Performance evaluation methodologies for Smart Grid Substation Communication Networks: A survey. 228-246
- Mustafa Kara

, Hisham R. J. Merzeh, Muhammed Ali Aydin, Hasan Hüseyin Balik
:
VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain. 247-261 - P. Satyanarayana, G. Diwakar, B. V. Subbayamma, N. V. Phani Sai Kumar, M. Arun, S. Gopalakrishnan

:
Comparative analysis of new meta-heuristic-variants for privacy preservation in wireless mobile adhoc networks for IoT applications. 262-281 - Pooja Verma

, Daya Sagar Gupta
:
A pairing-free data authentication and aggregation mechanism for Intelligent Healthcare System. 282-296

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














