![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Computer Communications, Volume 155
Volume 155, April 2020
- Tejasvi Alladi
, Vinay Chamola, Sherali Zeadally:
Industrial Control Systems: Cyberattack trends and countermeasures. 1-8
- Haina Song, Nan Wang, Jinkao Sun, Tao Luo, Jianfeng Li:
Enhanced anonymous models for microdata release based on sensitive levels partition. 9-23
- Omer Irshad
, Muhammad Usman Ghani Khan, Razi Iqbal, Shakila Basheer
, Ali Kashif Bashir:
Performance optimization of IoT based biological systems using deep learning. 24-31
- Li Ding, Zhongsheng Wang, Xiaodong Wang, Dong Wu:
Security information transmission algorithms for IoT based on cloud computing. 32-39
- Zhendong Liu, Hongfei Jia, Yanxia Wang:
Urban expressway parallel pattern recognition based on intelligent IOT data processing for smart city. 40-47
- Ziaul Haq Abbas
, Muhammad Sajid Haroon
, Ghulam Abbas
, Fazal Muhammad
:
SIR analysis for non-uniform HetNets with joint decoupled association and interference management. 48-57
- Jingjing Jiang, Haiwen Wang, Xiangwei Mu, Sheng Guan:
Logistics industry monitoring system based on wireless sensor network platform. 58-65
- Yalin Liu, Hong-Ning Dai
, Qubeijian Wang, Mahendra Kumar Shukla
, Muhammad Imran:
Unmanned aerial vehicle for internet of everything: Opportunities and challenges. 66-83
- Ambika K., M. Balasingh Moses:
An efficient SG-DACM framework for data integrity with user revocation in role based multiuser cloud environment. 84-92
- Wei-Che Chien, Shih-Yun Huang, Chin-Feng Lai
, Han-Chieh Chao, M. Shamim Hossain, Ghulam Muhammad
:
Multiple contents offloading mechanism in AI-enabled opportunistic networks. 93-103
- Slim Abdellatif, Pascal Berthou, Thierry Villemur, Armel Francklin Simo Tegueu:
Management of industrial communications slices: Towards the Application Driven Networking concept. 104-116
- Weiqiang Wang:
Deployment and optimization of wireless network node deployment and optimization in smart cities. 117-124
- Jianfeng Cui, Lixin Wang, Xin Zhao, Hongyi Zhang:
Towards predictive analysis of android vulnerability using statistical codes and machine learning for IoT applications. 125-131
- Kashif Naseer Qureshi
, Sadia Din
, Gwanggil Jeon, Francesco Piccialli:
Corrigendum to "Link quality and energy utilization based preferable next hop selection routing for wireless body area networks" [Comput. Commun. 149 (2020) 382-392]. 132
- S. Kokilavani Sankaralingam, N. Sathishkumar Nagarajan, A. S. Narmadha:
Energy aware decision stump linear programming boosting node classification based data aggregation in WSN. 133-142
- Yoney Kirsal Ever:
A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications. 143-149
- Waleed Ejaz
, Arslan Ahmed, Aliza Mushtaq, Mohamed Ibnkahla:
Energy-efficient task scheduling and physiological assessment in disaster management using UAV-assisted networks. 150-157 - Wanyi Zhang, Xiuhua Fu, Wei Li:
The intelligent vehicle target recognition algorithm based on target infrared features combined with lidar. 158-165
- Madhurima Buragohain
, Sukumar Nandi
:
Quality of Service provisioning in Named Data Networking via PIT entry reservation and PIT replacement policy. 166-183
- Yalin Liu, Hong-Ning Dai
, Hao Wang
, Muhammad Imran, Xiaofen Wang, Muhammad Shoaib
:
UAV-enabled data acquisition scheme with directional wireless energy transfer for Internet of Things. 184-196
- Juxia Xiong, Jinzhao Wu
:
Construction of information network vulnerability threat assessment model for CPS risk assessment. 197-204
- Elham Moridi, Majid Haghparast
, Mehdi Hosseinzadeh, Somaye Jafarali Jassbi:
Fault management frameworks in wireless sensor networks: A survey. 205-226
- Qiangyi Li
, Ningzhong Liu:
Monitoring area coverage optimization algorithm based on nodes perceptual mathematical model in wireless sensor networks. 227-234
- S. Malathi
, K. Elango
:
Implementation of dead beat controller using Particle Swarm Optimization for software defined network. 235-243
- Gang Hou, Lizhu Chen:
D2D communication mode selection and resource allocation in 5G wireless networks. 244-251
- Max Alaluna, Luís Ferrolho, José Rui Figueira
, Nuno Neves
, Fernando M. V. Ramos
:
Secure multi-cloud virtual network embedding. 252-265
- Stefano Ferretti, Gabriele D'Angelo:
Special Issue on Cryptocurrencies and Blockchains for Distributed Systems. 266
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.