


default search action
Journal of Network and Computer Applications, Volume 125
Volume 125, January 2019
- Inaki Val

, Ander Etxabe, Raul Torrego, Pedro Manuel Rodriguez
, Cristina Cruces, Víctor Díez
, Mikel Mendicute
, Aitor Arriola:
Design, analysis and implementation of a time-bounded spectrum handoff algorithm for real-time industrial wireless sensor and actuator networks. 1-16
- Seema Kharb

, Anita Singhrova
:
Fuzzy based priority aware scheduling technique for dense industrial IoT networks. 17-27 - V. Indu

, Sabu M. Thampi
:
A nature - inspired approach based on Forest Fire model for modeling rumor propagation in social networks. 28-41 - Srikant Manas Kala, Vanlin Sathya, M. Pavan Kumar Reddy, Betty Lala, Bheemarjuna Reddy Tamma

:
A socio-inspired CALM approach to channel assignment performance prediction and WMN capacity estimation. 42-66 - Vishal Sharma

, Jianfeng Guan, Jiyoon Kim
, Soonhyun Kwon, Ilsun You, Francesco Palmieri, Mario Collotta
:
MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks. 67-81
- Zhitao Guan, Yue Zhang, Longfei Wu

, Jun Wu, Jing Li, Yinglong Ma
, Jingjing Hu:
APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. 82-92 - Jinfang Jiang, Guangjie Han

, Hao Wang, Mohsen Guizani:
A survey on location privacy protection in Wireless Sensor Networks. 93-114 - Anil Kumar Rangisetti, Bheemarjuna Reddy Tamma

:
Interference and QoS aware cell switch-off strategy for software defined LTE HetNets. 115-129 - Chao Bu, Xingwei Wang, Hui Cheng

, Min Huang, Keqin Li:
Routing as a service (RaaS): An open framework for customizing routing services. 130-145 - Alper Bereketli

, Muharrem Tümçakir, Burcu Yeni:
P-AUV: Position aware routing and medium access for ad hoc AUV networks. 146-154 - Kostas Kolomvatsos:

Time-optimized management of mobile IoT nodes for pervasive applications. 155-167 - Zhuhua Liao

, Zengde Teng, Jian Zhang, Yizhi Liu, Hao Xiao, Aiping Yi:
A Semantic Concast service for data discovery, aggregation and processing on NDN. 168-178
- Garima Chopra, Rakesh Kumar Jha

, Sanjeev Jain:
RBA: Region Based Algorithm for secure harvesting in Ultra Dense Network. 179-189 - Zhen Liu, Ruoyu Wang, Nathalie Japkowicz

, Yongming Cai, Deyu Tang, Xianfa Cai:
Mobile app traffic flow feature extraction and selection for improving classification robustness. 190-208 - Shuhua Deng, Xing Gao, Zebin Lu, Zhengfa Li, Xieping Gao:

DoS vulnerabilities and mitigation strategies in software-defined networks. 209-219 - Xiuquan Qiao, Pei Ren

, Junliang Chen, Wei Tan, M. Brian Blake, Wangli Xu:
Session persistence for dynamic web applications in Named Data Networking. 220-235
- Weijie Han

, Jingfeng Xue, Yong Wang, Zhenyan Liu, Zixiao Kong:
MalInsight: A systematic profiling based malware detection framework. 236-250 - Imran Makhdoom

, Mehran Abolhasan
, Haider Abbas
, Wei Ni
:
Blockchain's adoption in IoT: The challenges, and a way forward. 251-279

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














