CN - 2022 - volume 207 论文列表 |
点击这里查看 Computer Networks 的JCR分区、影响因子等信息 |
David Hyland-Wood Sandra Johnson
Side-channel attacks on mobile and IoT devices for Cyber-Physical systems.Mauro Conti Eleonora Losiouk Radha Poovendran Riccardo Spolaor
An UAV-assisted mobile edge computing offloading strategy for minimizing energy consumption.Qiang Tang Lixin Liu Caiyan Jin Jin Wang Zhuofan Liao Yuansheng Luo
UAV-assisted connectivity enhancement algorithms for multiple isolated sensor networks in agricultural Internet of Things.Jiahui Pei Hongbin Chen Lei Shu
Clustering the sensor networks based on energy-aware affinity propagation.Ke Zhang Guang Zhang Xiuwu Yu Shaohua Hu Moxiao Li
Dynamic clustering of software defined network switches and controller placement using deep reinforcement learning.E. L. Hocine Bouzidi Abdelkader Outtagarts Rami Langar Raouf Boutaba
Joint flight scheduling and task allocation for secure data collection in UAV-aided IoTs.Zuyan Wang Jun Tao Yang Gao Yifan Xu Weice Sun Yu Gao Wenqiang Li
An Economic and Non-cooperative Load-balancing Framework among Federated Cloudlets.Sourav Mondal Goutam Das Elaine Wong
Decentralized joint resource allocation and path selection in multi-hop integrated access backhaul 5G networks.Hadeel Alghafari Mohammad Sayad Haghighi
A comparative study on online machine learning techniques for network traffic streams analysis.Amin Shahraki Mahmoud Abbasi Amir Taherkordi Anca Delia Jurcut
Latency and energy aware rate maximization in MC-NOMA-based multi-access edge computing: A two-stage deep reinforcement learning approach. SplitPath: High throughput using multipath routing in dual-radio Wireless Sensor Networks.Nildo dos Santos Ribeiro Júnior Marcos A. M. Vieira Luiz Filipe Menezes Vieira Omprakash Gnawali
Physical layer forwarding for 5G multi-hop Backhaul networks.Cheng Huang Aimin Tang Bangzhao Zhai Xudong Wang
On the design of efficient congestion control for the Constrained Application Protocol in IoT.Nabil Makarem Wafaa Bou Diab Imad Mougharbel Naceur Malouch
A survey: Distributed Machine Learning for 5G and beyond.Omar Nassef Wenting Sun Hakimeh Purmehdi Mallik Tatipamula Toktam Mahmoodi
SecFHome: Secure remote authentication in fog-enabled smart home environment.Yimin Guo Zhenfeng Zhang Yajun Guo
A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment.Ali AlSabeh Joseph Khoury Elie F. Kfoury Jorge Crichigno Elias Bou-Harb
Handling partially labeled network data: A semi-supervised approach using stacked sparse autoencoder.