


default search action
Computer Communications, Volume 182
Volume 182, January 2022
- Anix Anbiah
, Krishna M. Sivalingam
:
Efficient failure recovery techniques for segment-routed networks. 1-12 - Jameel Ali
, Majid Altamimi
:
Energy consumption model for data transfer in smartphone. 13-21
- Yanrong Lu
, Dawei Zhao
:
Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service. 22-30
- Sulaiman Khan
, Anwar Hussain
, Shah Nazir
, Fazlullah Khan
, Ammar Oad
, Mohammad Dahman Alshehri
:
Efficient and reliable hybrid deep learning-enabled model for congestion control in 5G/6G networks. 31-40
- Xiaopeng Yao
, Yue Gu, Chonglin Gu, Hejiao Huang
:
Fast controlling of rumors with limited cost in social networks. 41-51
- Liang Zhao, Chunyang Mo
, Jiajun Ma
, Zhikui Chen, Chenhui Yao
:
LSTM-MFCN: A time series classifier based on multi-scale spatial-temporal features. 52-59
- Peng Dai
, Yawen Wang, Dahai Jin, Yunzhan Gong, Wenjin Yang:
An improving approach to analyzing change impact of C programs. 60-71
- Pandit Byomakesha Dash
, Bighnaraj Naik, Janmenjoy Nayak
, S. Vimal
:
Socio-economic factor analysis for sustainable and smart precision agriculture: An ensemble learning approach. 72-87
- Noura Aljeri
, Azzedine Boukerche:
A novel proactive controller deployment protocol for 5G-enabled software-defined Vehicular Networks. 88-97
- Michael Markovitch, Gabriel Scalosub:
Bounded delay scheduling with packet dependencies. 98-109
- Zhan Shi, Huina Wei, Jian Zhu:
Edge computing-empowered task offloading in PLC-wireless integrated network based on matching with quota. 110-116
- Wanli Xue, Yiran Shen, Chengwen Luo, Weitao Xu
, Wen Hu
, Aruna Seneviratne:
A differential privacy-based classification system for edge computing in IoT. 117-128
- Yehia Ibrahim Alzoubi
, Ahmad Salah Al-Ahmad
, Hasan Kahtan
:
Blockchain technology as a Fog computing security and privacy solution: An overview. 129-152
- Ali El Kamel
, Hamdi Eltaief
, Habib Youssef:
On-the-fly (D)DoS attack mitigation in SDN using Deep Neural Network-based rate limiting. 153-169
- Jian Zhu, Qian Li, Shi Ying
:
SAAS parallel task scheduling based on cloud service flow load algorithm. 170-183
- Andrea Pimpinella
, Marianna Repossi, Alessandro E. C. Redondi
:
Unsatisfied today, satisfied tomorrow: A simulation framework for performance evaluation of crowdsourcing-based network monitoring. 184-197
- Sayed Qaiser Ali Shah, Farrukh Zeeshan Khan, Muneer Ahmad
:
Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN. 198-211
- Jiamin Zheng, Shupan Li, Shengang Hao, Yuanzhang Li, Yu Zhang:
ZM-CTC: Covert timing channel construction method based on zigzag matrix. 212-222
- Md. Munjure Mowla
, Iftekhar Ahmad
, Daryoush Habibi
, Quoc Viet Phung, M. Ishtiaque Aziz Zahed:
Green traffic backhauling in next generation wireless communication networks incorporating FSO/mmWave technologies. 223-237
- Yuyao Huang
, Hui Shu, Fei Kang, Yan Guang:
Protocol Reverse-Engineering Methods and Tools: A Survey. 238-254 - Jingfu Lu, Jiuling Li:
Two-phase sample average approximation for video distribution strategy of edge computing in heterogeneous network. 255-267

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
