


default search action
Computer Communications, Volume 180
Volume 180, December 2021
- Alfonso Martínez-Cruz
, Kelsey A. Ramírez-Gutiérrez
, Claudia Feregrino Uribe, Alicia Morales-Reyes:
Security on in-vehicle communication protocols: Issues, challenges, and future research directions. 1-20
- Zhi Li, Jiye Wang, Yang Wang, Sachula Meng, Sai Wu, Huixia Ding, Zhihui Wang:
Trade-off analysis between delay and throughput of RAN slicing for smart grid. 21-30
- Koosha Mohammad Hossein
, Mohammad Esmaeil Esmaeili, Tooska Dargahi
, Ahmad Khonsari, Mauro Conti
:
BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications. 31-47
- Dinesh Kumar Sah, Korhan Cengiz
, Praveen Kumar Donta
, Venkata N. Inukollu, Tarachand Amgoth:
EDGF: Empirical dataset generation framework for wireless sensor networks. 48-56
- Muataz Salam Al Daweri
, Salwani Abdullah, Khairul Akram Zainol Ariffin
:
An adaptive method and a new dataset, UKM-IDS20, for the network intrusion detection system. 57-76
- K. Narayana Rao, K. Venkata Rao, P. V. G. D. Prasad Reddy:
A hybrid Intrusion Detection System based on Sparse autoencoder and Deep Neural Network. 77-88
- Claudia L. Cortés
, Neil Guerrero González
:
Constellation diagram processing with convolutional neural networks for channel phase response estimation. 89-96 - Elmahdi Bentafat
, M. Mazhar Rathore, Spiridon Bakiras
:
Towards real-time privacy-preserving video surveillance. 97-108
- Lin Yuan
, Zhao Qiu:
Mask-RCNN with spatial attention for pedestrian segmentation in cyber-physical systems. 109-114
- Xin Liu
, Ruiling Zhang
, Gang Xu, Xiu-Bo Chen, Neal N. Xiong:
Confidentially judging the relationship between an integer and an interval against malicious adversaries and its applications. 115-125
- Suyu Zhang, Margarita Lagutkina, Kevser Ovaz Akpinar
, Mustafa Akpinar
:
Improving performance and data transmission security in VANETs. 126-133
- Nehuen Gonzalez-Montoro
, Jorge M. Finochietto
, Andrea Bianco:
Resource-aware provisioning strategies in translucent elastic optical networks. 134-145
- Krishna Prasad Satamraju, B. Malarkodi:
A decentralized framework for device authentication and data security in the next generation internet of medical things. 146-160
- Ning Jia, Chunjun Zheng:
Two-level discriminative speech emotion recognition model with wave field dynamics: A personalized speech emotion recognition method. 161-170
- Walid Miloud Dahmane
, Samir Ouchani
, Hafida Bouarfa:
Towards a reliable smart city through formal verification and network analysis. 171-187
- Mingyang Cui
, Weiliang Han, Datong Xu, Pan Zhao, Weixia Zou:
Hybrid precoding design based on alternating optimization in mmWave massive MIMO systems aided by intelligent reflecting surface. 188-196 - Zhuangye Luo, Jia Xu, Pengcheng Zhao, Dejun Yang, Lijie Xu, Jian Luo:
Towards high quality mobile crowdsensing: Incentive mechanism design based on fine-grained ability reputation. 197-209
- Mohammed Laroui
, Boubakr Nour, Hassine Moungla
, Moussa Ali Cherif, Hossam Afifi, Mohsen Guizani:
Edge and fog computing for IoT: A survey on current research activities & future directions. 210-231
- Jianhe Du
, Yang Zhang, Yuanzhi Chen, Xingwang Li, Yuan Cheng, M. V. Rajesh:
Hybrid beamforming NOMA for mmWave half-duplex UAV relay-assisted B5G/6G IoT networks. 232-242
- Alberto Bartoli
:
Robustness analysis of DNS paths and web access paths in public administration websites. 243-258
- Ali Abedi
, Tim Brecht, Omid Abari:
Demystifying frame aggregation in 802.11 networks: Understanding and approximating optimality. 259-270
- Peizhi Yan
, Salimur Choudhury:
Deep Q-learning enabled joint optimization of mobile edge computing multi-level task offloading. 271-283
- Ghulam Abbas
, Ziaul Haq Abbas
, Zaiwar Ali
, Muhammad Shahwar Asad
, Uttam Ghosh, Muhammad Bilal
:
Smart stochastic routing for 6G-enabled massive Internet of Things. 284-294
- Ying Xing, Xingde Wang, Qianpeng Shen:
Test case prioritization based on Artificial Fish School Algorithm. 295-302
- Taoufik Yeferny
, Sadok Ben Yahia
:
A Markov chain-based data dissemination protocol for vehicular ad hoc networks. 303-314
- Mosab Hamdan
, Suleman Khan
, Ahmed Abdelaziz, Shahidatul Sadiah, Nasir Shaikh-Husin, Sattam Al Otaibi, Carsten Maple
, Muhammad N. Marsono:
DPLBAnt: Improved load balancing technique based on detection and rerouting of elephant flows in software-defined networks. 315-327 - Mohammad Kamrul Hasan, Teong Chee Chuah
, Ayman A. El-Saleh
, Muhammad Shafiq
, Shoaib Ahmed Shaikh
, Shayla Islam, Moez Krichen
:
Constriction Factor Particle Swarm Optimization based load balancing and cell association for 5G heterogeneous networks. 328-337

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.