


default search action
Network, Volume 2
Volume 2, Number 1, 2022
- Marjo Heikkilä
, Jani Suomalainen
, Ossi Saukko
, Tero Kippola, Kalle Lähetkangas
, Pekka Koskela
, Juha Kalliovaara
, Hannu Haapala, Juho Pirttiniemi
, Anastasia Yastrebova
, Harri Posti:
Unmanned Agricultural Tractors in Private Mobile Networks. 1-20 - Hai Trieu Le, Tran Thanh Lam Nguyen
, Tuan Anh Nguyen, Ha Xuan Son, Nghia Duong-Trung
:
BloodChain: A Blood Donation Network Managed by Blockchain Technologies. 21-35 - Miguel Rosendo
, Jorge Granjal
:
Energy-Aware Security Adaptation for Low-Power IoT Applications. 36-52 - Sunghwan Cho
, Gaojie Chen
, Justin P. Coon
, Pei Xiao:
Challenges in Physical Layer Security for Visible Light Communication Systems. 53-65 - Tieming Geng
, Laurent Njilla, Chin-Tser Huang
:
Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment. 66-80 - Pu Gong, Thomas M. Chen, Peng Xu:
Resource-Conserving Protection against Energy Draining (RCPED) Routing Protocol for Wireless Sensor Networks. 83-105 - Shuaibing Lu
, Jie Wu, Jiamei Shi, Pengfan Lu, Juan Fang
, Haiming Liu:
A Dynamic Service Placement Based on Deep Reinforcement Learning in Mobile Edge Computing. 106-122 - Frank Akpan, Gueltoum Bendiab
, Stavros Shiaeles
, Stavros Karamperidis
, Michalis Michaloliakos:
Cybersecurity Challenges in the Maritime Sector. 123-138 - Hassan Mistareehi, D. Manivannan
:
A Low-Overhead Message Authentication and Secure Message Dissemination Scheme for VANETs. 139-152 - Stan Wong
, Bin Han
, Hans D. Schotten
:
5G Network Slice Isolation. 153-167 - Md. Amirul Hasan Shanto
, Binodon
, Amit Karmaker
, Md. Mahfuz Reza, Md. Abir Hossain
:
Cluster-Based Transmission Diversity Optimization in Ultra Reliable Low Latency Communication. 168-189 - Yingyuan Yang
, Jiangnan Li, Sunshin Lee, Xueli Huang, Jinyuan Sun:
EchoIA: A Cloud-Based Implicit Authentication Leveraging User Feedback. 190-202
Volume 2, Number 2, 2022
- Gizem Akman
, Philip Ginzboorg
, Valtteri Niemi
:
Privacy-Aware Access Protocols for MEC Applications in 5G. 203-224 - Issa Dia, Ehsan Ahvar, Gyu Myoung Lee
:
Performance Evaluation of Machine Learning and Neural Network-Based Algorithms for Predicting Segment Availability in AIoT-Based Smart Parking. 225-238 - Muneera Alsayegh, Tarek Moulahi
, Abdulatif Alabdulatif
, Pascal Lorenz
:
Towards Secure Searchable Electronic Health Records Using Consortium Blockchain. 239-256 - Haider W. Oleiwi
, Nagham H. Saeed
, Hamed S. Al-Raweshidy:
Cooperative SWIPT MIMO-NOMA for Reliable THz 6G Communications. 257-269 - Hongliang Mao, Jie Zhong
, Siyuan Yu, Pei Xiao, Xinghao Yang, Gaoyuan Lu:
An Atmospheric Turbulence Compensation Algorithm Based on FSM-DM Cascaded AO Architecture for FSO Communications. 270-288 - Yi-Hang Zhu
, Gilles Callebaut
, Hatice Çalik
, Liesbet Van der Perre
, François Rottenberg
:
Energy Efficient Access Point Placement for Distributed Massive MIMO. 288-310 - Rasmus Rettig
, Christoph Schöne, Frederik Fröhlich, Christopher Niemöller
:
Method for Systematic Assessment of Mobile Network Coverage for Logistic Applications on the German Highway. 311-328 - Muntadher Alsabah
, Marwah Abdulrazzaq Naser
, Basheera M. Mahmmod
, Sadiq H. Abdulhussain
:
A Computationally Efficient Gradient Algorithm for Downlink Training Sequence Optimization in FDD Massive MIMO Systems. 329-349 - Konstantinos I. Roumeliotis
, Nikolaos D. Tselikas
:
Evaluating Progressive Web App Accessibility for People with Disabilities. 350-369
Volume 2, Number 3, 2022
- Ralph Voltaire J. Dayot
, In-Ho Ra
, Hyung-Jin Kim:
A Deep Contextual Bandit-Based End-to-End Slice Provisioning Approach for Efficient Allocation of 5G Network Resources. 370-388 - Tomofumi Matsuzawa
, Kyosuke Ichikawa:
Implementation and Evaluation of HTTP/3 Connectivity Check Using Happy Eyeballs Algorithm. 389-397 - Zongze Li
, Shuai Wang, Qingfeng Lin, Yang Li
, Miaowen Wen
, Yik-Chung Wu, H. Vincent Poor
:
Phase Shift Design in RIS Empowered Wireless Networks: From Optimization to AI-Based Methods. 398-418 - Ed Kamya Kiyemba Edris
, Mahdi Aiash
, Jonathan Loo
:
An Introduction of a Modular Framework for Securing 5G Networks and Beyond. 419-439 - Dennis Krummacker
, Benedikt Veith
, Christoph Fischer
, Hans Dieter Schotten
:
Analysis of 5G Channel Access for Collaboration with TSN Concluding at a 5G Scheduling Mechanism. 440-455 - Stavros Karageorgiou
, Vasileios Karyotis
:
Markov-Based Malware Propagation Modeling and Analysis in Multi-Layer Networks. 456-478
Volume 2, Number 4, 2022
- Gia Khanh Tran
, Masanori Ozasa, Jin Nakazato
:
NFV/SDN as an Enabler for Dynamic Placement Method of mmWave Embedded UAV Access Base Stations. 479-499 - Ahmed Osama Basil Al-Mashhadani
, Mu Mu
, Ali Al-Sharbaz:
Quality of Experience Experimentation Prediction Framework through Programmable Network Management. 500-518 - Babatunde Ojetunde
, Naoto Egashira, Kenta Suzuki, Takuya Kurihara, Kazuto Yano
, Yoshinori Suzuki:
A Multimodel-Based Approach for Estimating Cause of Scanning Failure and Delay in IoT Wireless Network. 519-544 - John Kafke, Thiago Viana
:
Call Me Maybe: Using Dynamic Protocol Switching to Mitigate Denial-of-Service Attacks on VoIP Systems. 545-567 - Maria Papathanasaki
, Panagiotis Fountas
, Kostas Kolomvatsos
:
An Uncertainty-Driven Proactive Self-Healing Model for Pervasive Applications. 568-582 - Doaa N. Mhawi
, Haider W. Oleiwi
, Nagham H. Saeed
, Heba L. Al-Taie:
An Efficient Information Retrieval System Using Evolutionary Algorithms. 583-605 - Shaharyar Khan, Stuart E. Madnick
:
Protecting Chiller Systems from Cyberattack Using a Systems Thinking Approach. 606-627 - Garett T. Fox
, Rajendra V. Boppana
:
Detection of Malicious Network Flows with Low Preprocessing Overhead. 628-642 - Tariq Daradkeh
, Anjali Agarwal:
Cloud Workload and Data Center Analytical Modeling and Optimization Using Deep Machine Learning. 643-669 - Radheshyam Singh
, José Soler
, Tidiane Sylla, Léo Mendiboure
, Marion Berbineau:
Coexistence of Railway and Road Services by Sharing Telecommunication Infrastructure Using SDN-Based Slicing: A Tutorial. 670-706

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.