


default search action
IEEE Communications Surveys and Tutorials, Volume 21
Volume 21, Number 1, Firstquarter 2019
- Ying-Dar Lin
:
Editorial: First Quarter 2019 IEEE Communications Surveys and Tutorials. 1-9 - Danping He
, Bo Ai
, Ke Guan
, Longhe Wang, Zhangdui Zhong, Thomas Kürner
:
The Design and Applications of High-Performance Ray-Tracing Simulation Platform for 5G and Beyond Wireless Communications: A Tutorial. 10-27 - Fadi Al-Turjman
, Enver Ever
, Hadi Zahmatkesh
:
Small Cells in the Forthcoming 5G/IoT: Traffic Modelling and Deployment Overview. 28-65 - Jiguang He
, Valtteri Tervo, Xiaobo Zhou
, Xin He
, Shen Qian
, Meng Cheng, Markku J. Juntti
, Tad Matsumoto
:
A Tutorial on Lossy Forwarding Cooperative Relaying. 66-87 - Ahmed Nasrallah, Akhilesh S. Thyagaturu, Ziyad Alharbi
, Cui-Xiang Wang, Xing Shao, Martin Reisslein
, Hesham Elbakoury:
Ultra-Low Latency (ULL) Networks: The IEEE TSN and IETF DetNet Standards and Related 5G ULL Research. 88-145 - Line M. P. Larsen
, Aleksandra Checko, Henrik Lehrmann Christiansen
:
A Survey of the Functional Splits Proposed for 5G Mobile Crosshaul Networks. 146-172 - Marco Giordani
, Michele Polese
, Arnab Roy
, Douglas R. Castor, Michele Zorzi
:
A Tutorial on Beam Management for 3GPP NR at mmWave Frequencies. 173-196 - Evgeny M. Khorov
, Anton Kiryanov, Andrey I. Lyakhov
, Giuseppe Bianchi:
A Tutorial on IEEE 802.11ax High Efficiency WLANs. 197-216 - Tengfei Chang, Thomas Watteyne
, Xavier Vilajosana
, Pedro Henrique Gomes
:
Constructive Interference in 802.15.4: A Tutorial. 217-237 - Faroq A. Awin
, Esam Abdel-Raheem, Kemal Tepe
:
Blind Spectrum Sensing Approaches for Interweaved Cognitive Radio System: A Tutorial and Short Course. 238-259 - José Moura
, David Hutchison
:
Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends. 260-288 - Benjamin Baron
, Prométhée Spathis, Marcelo Dias de Amorim
, Yannis Viniotis, Mostafa H. Ammar
:
Mobility as an Alternative Communication Channel: A Survey. 289-314 - Tianqi Mao
, Qi Wang
, Zhaocheng Wang
, Sheng Chen
:
Novel Index Modulation Techniques: A Survey. 315-348 - Yinbo Yu
, Xing Li
, Xue Leng
, Libin Song
, Kai Bu
, Yan Chen, Jianfeng Yang
, Liang Zhang, Kang Cheng, Xin Xiao:
Fault Management in Software-Defined Networking: A Survey. 349-392 - Junfeng Xie
, F. Richard Yu
, Tao Huang
, Renchao Xie
, Jiang Liu, Chen-meng Wang
, Yunjie Liu:
A Survey of Machine Learning Techniques Applied to Software Defined Networking (SDN): Research Issues and Challenges. 393-430 - Behnam Dezfouli
, Vahid Esmaeelzadeh, Jaykumar Sheth
, Marjan Radi:
A Review of Software-Defined WLANs: Architectures and Central Control Mechanisms. 431-463 - Zahraa N. Abdullah, Imtiaz Ahmad
, Iftekhar Hussain:
Segment Routing in Software Defined Networks: A Survey. 464-486 - Hajar Hantouti
, Nabil Benamar
, Tarik Taleb
, Abdelquoddouss Laghrissi
:
Traffic Steering for Service Function Chaining. 487-507 - Beakcheol Jang
, Hyunjung Kim:
Indoor Positioning Technologies Without Offline Fingerprinting Map: A Survey. 508-525 - Stephan Kleber
, Lisa Maile
, Frank Kargl
:
Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis. 526-561 - Abdelhak Bentaleb
, Bayan Taani
, Ali C. Begen
, Christian Timmerer
, Roger Zimmermann
:
A Survey on Bitrate Adaptation Schemes for Streaming Media Over HTTP. 562-585 - Xuyang Jing, Zheng Yan
, Witold Pedrycz
:
Security Data Collection and Data Analytics in the Internet: A Survey. 586-618 - Anna Volkova
, Michael Niedermeier
, Robert Basmadjian
, Hermann de Meer:
Security Challenges in Control Network Protocols: A Survey. 619-639 - Martin Husák
, Jana Komárková, Elias Bou-Harb
, Pavel Celeda
:
Survey of Attack Projection, Prediction, and Forecasting in Cyber Security. 640-660 - Amit Praseed
, P. Santhi Thilagam
:
DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications. 661-685 - Preeti Mishra
, Vijay Varadharajan
, Udaya Kiran Tupakula
, Emmanuel S. Pilli
:
A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection. 686-728 - Shengming Jiang
:
On Securing Underwater Acoustic Networks: A Survey. 729-752 - Tao Wang
, Zhigao Zheng
, Mubashir Husain Rehmani
, Shihong Yao, Zheng Huo:
Privacy Preservation in Big Data From the Communication Perspective - A Survey. 753-778 - Rens Wouter van der Heijden
, Stefan Dietzel
, Tim Leinmüller
, Frank Kargl
:
Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems. 779-811 - Ivan Farris
, Tarik Taleb
, Yacine Khettab, JaeSeung Song
:
A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems. 812-837 - Till Neudecker
, Hannes Hartenstein
:
Network Layer Aspects of Permissionless Blockchains. 838-857 - Tara Salman
, Maede Zolanvari
, Aiman Erbad
, Raj Jain
, Mohammed Samaka:
Security Services Using Blockchains: A State of the Art Survey. 858-880 - Nedasadat Hosseinidehaj
, Zunaira Babar
, Robert A. Malaney
, Soon Xin Ng
, Lajos Hanzo
:
Satellite-Based Continuous-Variable Quantum Communications: State-of-the-Art and a Predictive Outlook. 881-919 - Roberto Massi de Oliveira
, Alex Borges Vieira
, Haniph A. Latchman
, Moisés Vidal Ribeiro
:
Medium Access Control Protocols for Power Line Communication: A Survey. 920-939 - Yahui Li
, Xia Yin, Zhiliang Wang
, Jiangyuan Yao, Xingang Shi, Jianping Wu, Han Zhang, Qing Wang:
A Survey on Network Verification and Testing With Formal Methods: Approaches and Challenges. 940-969 - Zunaira Babar
, Daryus Chandra
, Hung Viet Nguyen
, Panagiotis Botsinis, Dimitrios Alanis
, Soon Xin Ng
, Lajos Hanzo
:
Duality of Quantum and Classical Error Correction Codes: Design Principles and Examples. 970-1010
Volume 21, Number 2, Secondquarter 2019
- Ying-Dar Lin
:
Editorial: Second Quarter 2019 IEEE Communications Surveys and Tutorials. 1011-1019 - Domenico Striccoli
, Giuseppe Piro
, Gennaro Boggia:
Multicast and Broadcast Services Over Mobile Networks: A Survey on Standardized Approaches and Scientific Outcomes. 1020-1063 - Pedro Heleno Isolani
, Maxim Claeys, Carlos Donato, Lisandro Zambenedetti Granville
, Steven Latré:
A Survey on the Programmability of Wireless MAC Protocols. 1064-1092 - Yushu Zhang
, Yong Xiang
, Leo Yu Zhang
, Yue Rong
, Song Guo
:
Secure Wireless Communications Based on Compressive Sensing: A Survey. 1093-1111 - Andra M. Voicu
, Ljiljana Simic
, Marina Petrova
:
Survey of Spectrum Sharing for Inter-Technology Coexistence. 1112-1144 - William J. Tomlinson
, Stella Banou
, Christopher Yu, Milica Stojanovic
, Kaushik R. Chowdhury
:
Comprehensive Survey of Galvanic Coupling and Alternative Intra-Body Communication Technologies. 1145-1164 - Abdallah Jarwan
, Ayman I. Sabbah
, Mohamed Ibnkahla
, Omneya Issa:
LTE-Based Public Safety Networks: A Survey. 1165-1187 - Vanessa Quintero
, Claudio Estevez
, Marcos E. Orchard
, Aramis Pérez
:
Improvements of Energy-Efficient Techniques in WSNs: A MAC-Protocol Approach. 1188-1208 - Panagiotis Botsinis, Dimitrios Alanis
, Zunaira Babar
, Hung Viet Nguyen
, Daryus Chandra
, Soon Xin Ng
, Lajos Hanzo
:
Quantum Search Algorithms for Wireless Communications. 1209-1242 - Jiadai Wang
, Jiajia Liu
, Nei Kato
:
Networking and Communications in Autonomous Driving: A Survey. 1243-1274 - Rasheed Hussain
, Sherali Zeadally
:
Autonomous Cars: Research Results, Issues, and Future Challenges. 1275-1313 - Xiaojie Wang
, Zhaolong Ning
, MengChu Zhou
, Xiping Hu
, Lei Wang, Yan Zhang
, Fei Richard Yu
, Bin Hu
:
Privacy-Preserving Content Dissemination for Vehicular Social Networks: Challenges and Solutions. 1314-1345 - Abdelbaset S. Hamza
, Jitender S. Deogun, Dennis R. Alexander:
Classification Framework for Free Space Optical Communication Links and Systems. 1346-1382 - Francesco Musumeci
, Cristina Rottondi
, Avishek Nag
, Irene Macaluso, Darko Zibar
, Marco Ruffini
, Massimo Tornatore
:
An Overview on Application of Machine Learning Techniques in Optical Networks. 1383-1408 - Abdelquoddouss Laghrissi
, Tarik Taleb
:
A Survey on the Placement of Virtual Resources and Virtual Network Functions. 1409-1434 - Klaus-Tycho Foerster
, Stefan Schmid
, Stefano Vissicchio
:
Survey of Consistent Software-Defined Network Updates. 1435-1461 - Jorge Proença
, Tiago Cruz
, Paulo Simões
, Edmundo Monteiro
:
Virtualization of Residential Gateways: A Comprehensive Survey. 1462-1482 - Xinli Huang
, Shang Cheng
, Kun Cao
, Peijin Cong
, Tongquan Wei
, Shiyan Hu
:
A Survey of Deployment Solutions and Optimization Strategies for Hybrid SDN Networks. 1483-1507 - Ruizhe Yang, F. Richard Yu
, Pengbo Si
, Zhaoxin Yang
, Yanhua Zhang:
Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges. 1508-1532 - Rong Du
, Paolo Santi, Ming Xiao
, Athanasios V. Vasilakos
, Carlo Fischione
:
The Sensable City: A Survey on the Deployment and Management for Smart City Monitoring. 1533-1560 - Wael Ayoub
, Abed Ellatif Samhat
, Fabienne Nouvel, Mohamad Mroué
, Jean-Christophe Prévotet
:
Internet of Mobile Things: Overview of LoRaWAN, DASH7, and NB-IoT in LPWANs Standards and Supported Mobility. 1561-1581 - Ahmed Raoof
, Ashraf Matrawy
, Chung-Horng Lung:
Routing Attacks and Mitigation Methods for RPL-Based Internet of Things. 1582-1606 - Baraq Ghaleb
, Ahmed Yassin Al-Dubai
, Elias Ekonomou
, Ayoub Alsarhan
, Youssef Nasser
, Lewis M. Mackenzie, Azzedine Boukerche
:
A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-Power and Lossy Networks: A Focus on Core Operations. 1607-1635 - Imran Makhdoom
, Mehran Abolhasan
, Justin Lipman
, Ren Ping Liu
, Wei Ni
:
Anatomy of Threats to the Internet of Things. 1636-1675 - Muhammad Salek Ali
, Massimo Vecchio
, Miguel Pincheira
, Koustabh Dolui
, Fabio Antonelli
, Mubashir Husain Rehmani
:
Applications of Blockchains in the Internet of Things: A Comprehensive Survey. 1676-1717 - Mehdi Sookhak
, Helen Tang, Ying He
, F. Richard Yu
:
Security and Privacy of Smart Cities: A Survey, Research Issues and Challenges. 1718-1743 - Nan Sun
, Jun Zhang
, Paul Rimba, Shang Gao
, Leo Yu Zhang
, Yang Xiang
:
Data-Driven Cybersecurity Incident Prediction: A Survey. 1744-1772 - Jehad M. Hamamreh
, Haji M. Furqan
, Hüseyin Arslan
:
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey. 1773-1828 - Sina Rezaei Aghdam
, Alireza Nooraiepour
, Tolga M. Duman
:
An Overview of Physical Layer Security With Finite-Alphabet Signaling. 1829-1850 - Adel Alshamrani
, Sowmya Myneni, Ankur Chowdhary
, Dijiang Huang
:
A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities. 1851-1877 - Dong Wang
, Bo Bai
, Wenbo Zhao, Zhu Han:
A Survey of Optimization Approaches for Wireless Physical Layer Security. 1878-1911 - Lailong Luo
, Deke Guo
, Richard T. B. Ma
, Ori Rottenstreich, Xueshan Luo:
Optimizing Bloom Filter: Challenges, Solutions, and Comparisons. 1912-1949 - Zhuo Li
, Yaping Xu
, Beichuan Zhang, Liu Yan
, Kaihua Liu
:
Packet Forwarding in Named Data Networking Requirements and Survey of Solutions. 1950-1987 - Fannia Pacheco
, Ernesto Exposito
, Mathieu Gineste, Cédric Baudoin, José Aguilar:
Towards the Deployment of Machine Learning Solutions in Network Traffic Classification: A Systematic Survey. 1988-2014 - Peter Orosz
, Tamas Tothfalusi, Pál Varga:
FPGA-Assisted DPI Systems: 100 Gbit/s and Beyond. 2015-2040 - Jorge Crichigno
, Elias Bou-Harb
, Nasir Ghani
:
A Comprehensive Tutorial on Science DMZ. 2041-2078
Volume 21, Number 3, Thirdquarter 2019
- Ying-Dar Lin
:
Editorial: Third Quarter 2019 IEEE Communications Surveys and Tutorials. 2079-2086 - Junmei Yao
, Jun Xu
, Sheng Luo
, Lu Wang
, Chao Yang
, Kaishun Wu
, Wei Lou:
Comprehensive Study on MIMO-Related Interference Management in WLANs. 2087-2110 - Alexander Vavoulas
, Harilaos G. Sandalidis
, Nestor D. Chatzidiamantis
, Zhengyuan Xu
, George K. Karagiannidis
:
A Survey on Ultraviolet C-Band (UV-C) Communications. 2111-2133 - Yinglei Teng
, Mengting Liu
, F. Richard Yu
, Victor C. M. Leung
, Mei Song, Yong Zhang
:
Resource Allocation for Ultra-Dense Networks: A Survey, Some Research Issues and Challenges. 2134-2168 - Monirosharieh Vameghestahbanati
, Ian D. Marsland
, Ramy H. Gohary, Halim Yanikomeroglu
:
Multidimensional Constellations for Uplink SCMA Systems - A Comparative Study. 2169-2194 - Supriya Aggarwal
:
A Survey-cum-Tutorial on Approximations to Gaussian ${Q}$ Function for Symbol Error Probability Analysis Over Nakagami- ${m}$ Fading Channels. 2195-2223 - Chaoyun Zhang
, Paul Patras
, Hamed Haddadi:
Deep Learning in Mobile and Wireless Networking: A Survey. 2224-2287 - Hina Tabassum
, Mohammad Salehi
, Ekram Hossain
:
Fundamentals of Mobility-Aware Performance Characterization of Cellular Networks: A Tutorial. 2288-2308 - Shuai Shao, Peter Hailes
, Tsang-Yi Wang
, Jwo-Yuh Wu
, Robert G. Maunder
, Bashir M. Al-Hashimi, Lajos Hanzo
:
Survey of Turbo, LDPC, and Polar Decoder ASIC Implementations. 2309-2333 - Mohammad Mozaffari
, Walid Saad
, Mehdi Bennis
, Young-Han Nam
, Mérouane Debbah:
A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems. 2334-2360 - Wahab Khawaja
, Ismail Güvenç
, David W. Matolak
, Uwe-Carsten Fiebig
, Nicolas Schneckenburger
:
A Survey of Air-to-Ground Propagation Channel Modeling for Unmanned Aerial Vehicles. 2361-2391 - Paulo H. L. Rettore
, Guilherme Maia
, Leandro A. Villas
, Antonio A. F. Loureiro
:
Vehicular Data Space: The Data Point of View. 2392-2418 - Andrea Capponi
, Claudio Fiandrino
, Burak Kantarci
, Luca Foschini
, Dzmitry Kliazovich, Pascal Bouvry
:
A Survey on Mobile Crowdsensing Systems: Challenges, Solutions, and Opportunities. 2419-2465 - Yuzhou Li
, Shengnan Wang, Cheng Jin, Yu Zhang
, Tao Jiang
:
A Survey of Underwater Magnetic Induction Communications: Fundamental Issues, Recent Advances, and Challenges. 2466-2487 - Gordon J. Sutton
, Jie Zeng
, Ren Ping Liu
, Wei Ni
, Diep N. Nguyen
, Beeshanga Abewardana Jayawickrama
, Xiaojing Huang
, Mehran Abolhasan
, Zhang Zhang, Eryk Dutkiewicz
, Tiejun Lv
:
Enabling Technologies for Ultra-Reliable and Low Latency Communications: From PHY and MAC Layer Perspectives. 2488-2524 - Jingjing Yao
, Tao Han
, Nirwan Ansari
:
On Mobile Edge Caching. 2525-2553 - Ivo Bizon Franco de Almeida
, Luciano Leonel Mendes
, Joel J. P. C. Rodrigues
, Mauro A. A. da Cruz
:
5G Waveforms for IoT Applications. 2554-2567 - Faheem Zafari
, Athanasios Gkelias
, Kin K. Leung
:
A Survey of Indoor Localization Systems and Technologies. 2568-2599 - Mu He
, Alberto Martínez Alba
, Arsany Basta
, Andreas Blenk
, Wolfgang Kellerer
:
Flexibility in Softwarized Networks: Classifications and Research Challenges. 2600-2636 - Mubashir Husain Rehmani
, Alan Davy
, Brendan Jennings
, Chadi Assi
:
Software Defined Networks-Based Smart Grid Communication: A Comprehensive Survey. 2637-2670 - Nadia Chaabouni
, Mohamed Mosbah
, Akka Zemmari
, Cyrille Sauvignac, Parvez Faruki:
Network Intrusion Detection for IoT Security Based on Learning Techniques. 2671-2701 - Nataliia Neshenko
, Elias Bou-Harb
, Jorge Crichigno
, Georges Kaddoum
, Nasir Ghani
:
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations. 2702-2733 - Furqan Jameel
, Shurjeel Wyne
, Georges Kaddoum
, Trung Q. Duong
:
A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security. 2734-2771 - Vincent Primault
, Antoine Boutet
, Sonia Ben Mokhtar
, Lionel Brunie:
The Long Road to Computational Location Privacy: A Survey. 2772-2793 - Junfeng Xie
, Helen Tang, Tao Huang
, F. Richard Yu
, Renchao Xie
, Jiang Liu
, Yunjie Liu:
A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges. 2794-2830 - Amrita Ghosal
, Mauro Conti
:
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey. 2831-2848 - Yutong Liu, Linghe Kong
, Guihai Chen
:
Data-Oriented Mobile Crowdsensing: A Comprehensive Survey. 2849-2885 - Pardeep Kumar
, Yun Lin
, Guangdong Bai
, Andrew Paverd
, Jin Song Dong, Andrew P. Martin
:
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues. 2886-2927 - Michal Stepanovsky
:
A Comparative Review of MEMS-Based Optical Cross-Connects for All-Optical Networks From the Past to the Present Day. 2928-2946 - Mohanad Obeed
, Anas M. Salhab
, Mohamed-Slim Alouini
, Salam A. Zummo
:
On Optimizing VLC Networks for Downlink Multi-User Transmission: A Survey. 2947-2976 - Qiwang Chen
, Lin Wang
, Pingping Chen
, Guanrong Chen
:
Optimization of Component Elements in Integrated Coding Systems for Green Communications: A Survey. 2977-2999
Volume 21, Number 4, Fourthquarter 2019
- Ying-Dar Lin
:
Editorial: Fourth Quarter 2019 IEEE Communications Surveys and Tutorials. 3000-3006 - Muhammad Amjad
, Leila Musavian
, Mubashir Husain Rehmani
:
Effective Capacity in Wireless Networks: A Comprehensive Survey. 3007-3038 - Mingzhe Chen
, Ursula Challita, Walid Saad
, Changchuan Yin
, Mérouane Debbah:
Artificial Neural Networks-Based Machine Learning for Wireless Networks: A Tutorial. 3039-3071 - Yaohua Sun
, Mugen Peng
, Yangcheng Zhou, Yuzhe Huang, Shiwen Mao
:
Application of Machine Learning in Wireless Networks: Key Techniques and Open Issues. 3072-3108 - Mahmoud A. M. Albreem
, Markku J. Juntti
, Shahriar Shahabuddin
:
Massive MIMO Detection Techniques: A Survey. 3109-3132 - Nguyen Cong Luong
, Dinh Thai Hoang
, Shimin Gong
, Dusit Niyato
, Ping Wang
, Ying-Chang Liang
, Dong In Kim
:
Applications of Deep Reinforcement Learning in Communications and Networking: A Survey. 3133-3174 - Abderrahmen Trichili
, Ki-Hong Park
, Mourad Zghal, Boon S. Ooi
, Mohamed-Slim Alouini
:
Communicating Using Spatial Mode Multiplexing: Potentials, Challenges, and Perspectives. 3175-3203 - Luiz M. Matheus
, Alex Borges Vieira
, Luiz Filipe M. Vieira
, Marcos Augusto M. Vieira
, Omprakash Gnawali
:
Visible Light Communication: Concepts, Applications and Challenges. 3204-3237 - Qurrat-Ul-Ain Nadeem
, Abla Kammoun
, Mohamed-Slim Alouini
:
Elevation Beamforming With Full Dimension MIMO Architectures in 5G Systems: A Tutorial. 3238-3273 - Adamantia Stamou
, Nikos Dimitriou
, Kimon P. Kontovasilis
, Symeon Papavassiliou
:
Autonomic Handover Management for Heterogeneous Networks in a Future Internet Context: A Survey. 3274-3297 - Nguyen Cong Luong
, Ping Wang
, Dusit Niyato
, Ying-Chang Liang
, Zhu Han, Fen Hou
:
Applications of Economic and Pricing Models for Resource Management in 5G Wireless Networks: A Survey. 3298-3339 - Reza Shakeri
, Mohammed Ali Al-Garadi
, Ahmed Badawy
, Amr Mohamed
, Tamer Khattab
, Abdulla K. Al-Ali
, Khaled A. Harras
, Mohsen Guizani
:
Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey and Future Directions. 3340-3385 - Mbazingwa Elirehema Mkiramweni
, Chungang Yang
, Jiandong Li
, Wei Zhang
:
A Survey of Game Theory in Unmanned Aerial Vehicles Communications. 3386-3416 - Azade Fotouhi, Haoran Qiang
, Ming Ding
, Mahbub Hassan
, Lorenzo Galati-Giordano, Adrian García-Rodríguez, Jinhong Yuan
:
Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges. 3417-3442 - Nasir Saeed
, Mohamed-Slim Alouini
, Tareq Y. Al-Naffouri
:
Toward the Internet of Underground Things: A Systematic Survey. 3443-3466 - Giuseppe Aceto
, Valerio Persico
, Antonio Pescapè
:
A Survey on Information and Communication Technologies for Industry 4.0: State-of-the-Art, Taxonomies, Perspectives, and Challenges. 3467-3501 - Daniel Díaz Sánchez
, Andrés Marín López
, Florina Almenárez Mendoza
, Patricia Arias Cabarcos
, R. Simon Sherratt
:
TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications. 3502-3531 - Rathin Chandra Shit
, Suraj Sharma
, Deepak Puthal
, Philip James
, Biswajeet Pradhan
, Aad van Moorsel, Albert Y. Zomaya
, Rajiv Ranjan
:
Ubiquitous Localization (UbiLoc): A Survey and Taxonomy on Device Free Localization for Smart World. 3532-3564 - Nasir Saeed
, Haewoon Nam
, Tareq Y. Al-Naffouri
, Mohamed-Slim Alouini
:
A State-of-the-Art Survey on Multidimensional Scaling-Based Localization Techniques. 3565-3583 - Michele Polese
, Federico Chiariotti
, Elia Bonetto
, Filippo Rigotto
, Andrea Zanella
, Michele Zorzi
:
A Survey on Recent Advances in Transport Layer Protocols. 3584-3608 - Rasool Al-Saadi
, Grenville Armitage
, Jason But, Philip Branch
:
A Survey of Delay-Based and Hybrid TCP Congestion Control Algorithms. 3609-3638 - Lionel N. Tidjon
, Marc Frappier
, Amel Mammar:
Intrusion Detection Systems: A Cross-Domain Overview. 3639-3681 - Ijaz Ahmad
, Shahriar Shahabuddin
, Tanesh Kumar
, Jude Okwuibe, Andrei V. Gurtov
, Mika Ylianttila
:
Security for 5G and Beyond. 3682-3722 - Tahreem Yaqoob, Haider Abbas
, Mohammed Atiquzzaman
:
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices - A Review. 3723-3768 - Neha Agrawal
, Shashikala Tapaswi:
Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges. 3769-3795 - Marianna Belotti
, Nikola Bozic, Guy Pujolle, Stefano Secci
:
A Vademecum on Blockchain Technologies: When, Which, and How. 3796-3838

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.