


default search action
Computer Communications, Volume 198
Volume 198, January 2023
- Mizna Khalid
, Sufian Hameed
, Abdul Qadir, Syed Attique Shah
, Dirk Draheim
:
Towards SDN-based smart contract solution for IoT access control. 1-31 - Sella Veluswami Jansi Rani
, Iacovos Ioannou
, Prabagarane Nagaradjane, Christophoros Christophorou
, Vasos Vassiliou
, Sai Charan, Sai Prakash, Niel Parekh, Andreas Pitsillides:
Detection of DDoS attacks in D2D communications using machine learning approach. 32-51 - Jianbin Xue, Xiangrui Guan:
Collaborative computation offloading and resource allocation based on dynamic pricing in mobile edge computing. 52-62
- Aoxiang Feng, Dezun Dong, Fei Lei, Junchao Ma, Enda Yu, Ruiqi Wang:
In-network aggregation for data center networks: A survey. 63-76
- Xiaoou Liu, Xiaoyi Chen, Qi Bi, Wei Liang, Jingwen Li, Zheng Zhang:
Blockchain-based distributed operation and incentive solution for P-RAN. 77-84
- Vincenzo Eramo
, Tiziana Fiori
, Francesco Giacinto Lavacca, Francesco Valente
, Andrea Baiocchi, Simone Ciabuschi, Marta Albano
, Enrico Cavallini
:
A max plus algebra based scheduling algorithm for supporting time triggered services in ethernet networks. 85-97 - Lijuan Weng, Qishan Zhang, Zhibin Lin
, Ling Wu
, Jin-Hua Zhang
:
Integrating interactions between target users and opinion leaders for better recommendations: An opinion dynamics approach. 98-107
- Amir Namavar Jahromi
, Hadis Karimipour
, Ali Dehghantanha:
An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things. 108-116
- Bruna Toledo Guedes
, Diego G. Passos
, Fernanda G. O. Passos
:
A spectral clustering algorithm for intelligent grouping in Dense Wireless Networks. 117-127 - Houssem Eddin Elbsir
, Mohamed Kassab, Sami Bhiri, Mohamed Hedi Bedoui
:
Evaluation of LoRaWAN class B performances and its optimization for better support of actuators. 128-139 - Ranbir Dhounchak
, Veeraruna Kavitha
, Eitan Altman:
Viral marketing branching processes. 140-156 - Javad Dogani
, Farshad Khunjush
, Mehdi Seydali:
Host load prediction in cloud computing with Discrete Wavelet Transformation (DWT) and Bidirectional Gated Recurrent Unit (BiGRU) network. 157-174 - Yang Guo
:
A review of Machine Learning-based zero-day attack detection: Challenges and future directions. 175-185
- Anil Pise, Byungun Yoon
, Saurabh Singh:
Enabling Ambient Intelligence of Things (AIoT) healthcare system architectures. 186-194
- Junbo Wang, Xiusong Yang, Songcan Yu
, Qing Yuan
, Zhuotao Lian, Qinglin Yang:
Road crash risk prediction during COVID-19 for flash crowd traffic prevention: The case of Los Angeles. 195-205
- Xueyuan Duan, Yu Fu, Kun Wang:
Network traffic anomaly detection method based on multi-scale residual classifier. 206-216
- Beibei Cui, Jean-Charles Créput, Lei Zhang:
Self-organizing maps and full GPU parallel approach to graph matching. 217-227
- Théo Docquier
, Ye-Qiong Song, Vincent Chevrier, Ludovic Pontnau, Abdelaziz Ahmed Nacer:
Performance evaluation methodologies for Smart Grid Substation Communication Networks: A survey. 228-246
- Mustafa Kara
, Hisham R. J. Merzeh, Muhammed Ali Aydin, Hasan Hüseyin Balik
:
VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain. 247-261 - P. Satyanarayana, G. Diwakar, B. V. Subbayamma, N. V. Phani Sai Kumar, M. Arun, S. Gopalakrishnan
:
Comparative analysis of new meta-heuristic-variants for privacy preservation in wireless mobile adhoc networks for IoT applications. 262-281 - Pooja Verma
, Daya Sagar Gupta
:
A pairing-free data authentication and aggregation mechanism for Intelligent Healthcare System. 282-296

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
