Stop the war!
Остановите войну!
for scientists:
default search action
Network, Volume 2
Volume 2, Number 1, 2022
- Marjo Heikkilä, Jani Suomalainen, Ossi Saukko, Tero Kippola, Kalle Lähetkangas, Pekka Koskela, Juha Kalliovaara, Hannu Haapala, Juho Pirttiniemi, Anastasia Yastrebova, Harri Posti:
Unmanned Agricultural Tractors in Private Mobile Networks. 1-20 - Hai Trieu Le, Tran Thanh Lam Nguyen, Tuan Anh Nguyen, Ha Xuan Son, Nghia Duong-Trung:
BloodChain: A Blood Donation Network Managed by Blockchain Technologies. 21-35 - Miguel Rosendo, Jorge Granjal:
Energy-Aware Security Adaptation for Low-Power IoT Applications. 36-52 - Sunghwan Cho, Gaojie Chen, Justin P. Coon, Pei Xiao:
Challenges in Physical Layer Security for Visible Light Communication Systems. 53-65 - Tieming Geng, Laurent Njilla, Chin-Tser Huang:
Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment. 66-80 - Pu Gong, Thomas M. Chen, Peng Xu:
Resource-Conserving Protection against Energy Draining (RCPED) Routing Protocol for Wireless Sensor Networks. 83-105 - Shuaibing Lu, Jie Wu, Jiamei Shi, Pengfan Lu, Juan Fang, Haiming Liu:
A Dynamic Service Placement Based on Deep Reinforcement Learning in Mobile Edge Computing. 106-122 - Frank Akpan, Gueltoum Bendiab, Stavros Shiaeles, Stavros Karamperidis, Michalis Michaloliakos:
Cybersecurity Challenges in the Maritime Sector. 123-138 - Hassan Mistareehi, D. Manivannan:
A Low-Overhead Message Authentication and Secure Message Dissemination Scheme for VANETs. 139-152 - Stan Wong, Bin Han, Hans D. Schotten:
5G Network Slice Isolation. 153-167 - Md. Amirul Hasan Shanto, Binodon, Amit Karmaker, Md. Mahfuz Reza, Md. Abir Hossain:
Cluster-Based Transmission Diversity Optimization in Ultra Reliable Low Latency Communication. 168-189 - Yingyuan Yang, Jiangnan Li, Sunshin Lee, Xueli Huang, Jinyuan Sun:
EchoIA: A Cloud-Based Implicit Authentication Leveraging User Feedback. 190-202
Volume 2, Number 2, 2022
- Gizem Akman, Philip Ginzboorg, Valtteri Niemi:
Privacy-Aware Access Protocols for MEC Applications in 5G. 203-224 - Issa Dia, Ehsan Ahvar, Gyu Myoung Lee:
Performance Evaluation of Machine Learning and Neural Network-Based Algorithms for Predicting Segment Availability in AIoT-Based Smart Parking. 225-238 - Muneera Alsayegh, Tarek Moulahi, Abdulatif Alabdulatif, Pascal Lorenz:
Towards Secure Searchable Electronic Health Records Using Consortium Blockchain. 239-256 - Haider W. Oleiwi, Nagham H. Saeed, Hamed S. Al-Raweshidy:
Cooperative SWIPT MIMO-NOMA for Reliable THz 6G Communications. 257-269 - Hongliang Mao, Jie Zhong, Siyuan Yu, Pei Xiao, Xinghao Yang, Gaoyuan Lu:
An Atmospheric Turbulence Compensation Algorithm Based on FSM-DM Cascaded AO Architecture for FSO Communications. 270-288 - Yi-Hang Zhu, Gilles Callebaut, Hatice Çalik, Liesbet Van der Perre, François Rottenberg:
Energy Efficient Access Point Placement for Distributed Massive MIMO. 288-310 - Rasmus Rettig, Christoph Schöne, Frederik Fröhlich, Christopher Niemöller:
Method for Systematic Assessment of Mobile Network Coverage for Logistic Applications on the German Highway. 311-328 - Muntadher Alsabah, Marwah Abdulrazzaq Naser, Basheera M. Mahmmod, Sadiq H. Abdulhussain:
A Computationally Efficient Gradient Algorithm for Downlink Training Sequence Optimization in FDD Massive MIMO Systems. 329-349 - Konstantinos I. Roumeliotis, Nikolaos D. Tselikas:
Evaluating Progressive Web App Accessibility for People with Disabilities. 350-369
Volume 2, Number 3, 2022
- Ralph Voltaire J. Dayot, In-Ho Ra, Hyung-Jin Kim:
A Deep Contextual Bandit-Based End-to-End Slice Provisioning Approach for Efficient Allocation of 5G Network Resources. 370-388 - Tomofumi Matsuzawa, Kyosuke Ichikawa:
Implementation and Evaluation of HTTP/3 Connectivity Check Using Happy Eyeballs Algorithm. 389-397 - Zongze Li, Shuai Wang, Qingfeng Lin, Yang Li, Miaowen Wen, Yik-Chung Wu, H. Vincent Poor:
Phase Shift Design in RIS Empowered Wireless Networks: From Optimization to AI-Based Methods. 398-418 - Ed Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Loo:
An Introduction of a Modular Framework for Securing 5G Networks and Beyond. 419-439 - Dennis Krummacker, Benedikt Veith, Christoph Fischer, Hans Dieter Schotten:
Analysis of 5G Channel Access for Collaboration with TSN Concluding at a 5G Scheduling Mechanism. 440-455 - Stavros Karageorgiou, Vasileios Karyotis:
Markov-Based Malware Propagation Modeling and Analysis in Multi-Layer Networks. 456-478
Volume 2, Number 4, 2022
- Gia Khanh Tran, Masanori Ozasa, Jin Nakazato:
NFV/SDN as an Enabler for Dynamic Placement Method of mmWave Embedded UAV Access Base Stations. 479-499 - Ahmed Osama Basil Al-Mashhadani, Mu Mu, Ali Al-Sharbaz:
Quality of Experience Experimentation Prediction Framework through Programmable Network Management. 500-518 - Babatunde Ojetunde, Naoto Egashira, Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki:
A Multimodel-Based Approach for Estimating Cause of Scanning Failure and Delay in IoT Wireless Network. 519-544 - John Kafke, Thiago Viana:
Call Me Maybe: Using Dynamic Protocol Switching to Mitigate Denial-of-Service Attacks on VoIP Systems. 545-567 - Maria Papathanasaki, Panagiotis Fountas, Kostas Kolomvatsos:
An Uncertainty-Driven Proactive Self-Healing Model for Pervasive Applications. 568-582 - Doaa N. Mhawi, Haider W. Oleiwi, Nagham H. Saeed, Heba L. Al-Taie:
An Efficient Information Retrieval System Using Evolutionary Algorithms. 583-605 - Shaharyar Khan, Stuart E. Madnick:
Protecting Chiller Systems from Cyberattack Using a Systems Thinking Approach. 606-627 - Garett T. Fox, Rajendra V. Boppana:
Detection of Malicious Network Flows with Low Preprocessing Overhead. 628-642 - Tariq Daradkeh, Anjali Agarwal:
Cloud Workload and Data Center Analytical Modeling and Optimization Using Deep Machine Learning. 643-669 - Radheshyam Singh, José Soler, Tidiane Sylla, Léo Mendiboure, Marion Berbineau:
Coexistence of Railway and Road Services by Sharing Telecommunication Infrastructure Using SDN-Based Slicing: A Tutorial. 670-706
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.