CN - 2022 - volume 206 论文列表 |
点击这里查看 Computer Networks 的JCR分区、影响因子等信息 |
Sabrina Sicari Alessandra Rizzardi Alberto Coen-Porisini
Efficient spam and phishing emails filtering based on deep learning.Safaa Magdy Yasmine Abouelseoud Mervat Mikhail
Collision-free optimal packet scheduling algorithm for multi-hop wireless IoT networks.Hak-Jin Kim Marie S. Kim Seung-Jae Han
An integrated approach for energy efficient handover and key distribution protocol for secure NC-enabled small cells.Vipindev Adat Vasudevan Muhammad Tayyab George P. Koudouridis Xavier Gelabert Ilias Politis
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones.Mohamed A. El-Zawawy Alessandro Brighente Mauro Conti
A comprehensive survey of vulnerability and information security in SDN. PARFAIT: Privacy-preserving, secure, and low-delay service access in fog-enabled IoT ecosystems. Mobile edge computing for V2X architectures and applications: A survey.Lucas Bréhon-Grataloup Rahim Kacimi André-Luc Beylot
Toward scalable graph-based security analysis for cloud networks.Abdulhakim Sabur Ankur Chowdhary Dijiang Huang Adel Alshamrani
A blockchain-based and privacy-preserved authentication scheme for inter-constellation collaboration in Space-Ground Integrated Networks.Ting Xiong Ran Zhang Jiang Liu Tao Huang Yunjie Liu F. Richard Yu
Speeding up block propagation in Bitcoin network: Uncoded and coded designs.Lihao Zhang Taotao Wang Soung Chang Liew
BBRv2+: Towards balancing aggressiveness and fairness with delay-based bandwidth probing.Furong Yang Qinghua Wu Zhenyu Li Yanmei Liu Giovanni Pau Gaogang Xie
Throughput and latency in the distributed Q-learning random access mMTC networks.Giovanni Maciel Ferreira Silva Taufik Abrão
VideoTrain++: GAN-based adaptive framework for synthetic video traffic generation.Chamara Madarasingha Shashika Ranga Muramudalige Guillaume Jourjon Anura P. Jayasumana Kanchana Thilakarathna
Metaheuristic enabled modified hidden Markov model for traffic flow prediction. State-of-the-art survey of artificial intelligent techniques for IoT security.Tariq Ahamed Ahanger Abdullah Aljumah Mohammed Atiquzzaman
Dissecting traffic fingerprinting CNNs with filter activations.Thilini Dahanayaka Guillaume Jourjon Suranga Seneviratne
Understanding Internet of Things malware by analyzing endpoints in their static artifacts.Jinchun Choi Afsah Anwar Abdulrahman Alabduljabbar Hisham Alasmary Jeffrey Spaulding An Wang Songqing Chen DaeHun Nyang Amro Awad David Mohaisen
Path stability in partially deployed secure BGP routing.Yan Yang Xingang Shi Qiang Ma Yahui Li Xia Yin Zhiliang Wang
Optimized task scheduling for cost-latency trade-off in mobile fog computing using fuzzy analytical hierarchy process.Entesar Hosseini Mohsen Nickray Shamsollah Ghanbari
Self-play learning strategies for resource assignment in Open-RAN networks.Xiaoyang Wang Jonathan D. Thomas Robert J. Piechocki Shipra Kapoor Raúl Santos-Rodríguez Arjun Parekh
On the prediction of large-scale road-network constrained trajectories.Roniel S. de Sousa Azzedine Boukerche Antonio A. F. Loureiro