default search action
Computer Communications, Volume 155
Volume 155, April 2020
- Tejasvi Alladi, Vinay Chamola, Sherali Zeadally:
Industrial Control Systems: Cyberattack trends and countermeasures. 1-8
- Haina Song, Nan Wang, Jinkao Sun, Tao Luo, Jianfeng Li:
Enhanced anonymous models for microdata release based on sensitive levels partition. 9-23
- Omer Irshad, Muhammad Usman Ghani Khan, Razi Iqbal, Shakila Basheer, Ali Kashif Bashir:
Performance optimization of IoT based biological systems using deep learning. 24-31
- Li Ding, Zhongsheng Wang, Xiaodong Wang, Dong Wu:
Security information transmission algorithms for IoT based on cloud computing. 32-39
- Zhendong Liu, Hongfei Jia, Yanxia Wang:
Urban expressway parallel pattern recognition based on intelligent IOT data processing for smart city. 40-47
- Ziaul Haq Abbas, Muhammad Sajid Haroon, Ghulam Abbas, Fazal Muhammad:
SIR analysis for non-uniform HetNets with joint decoupled association and interference management. 48-57
- Jingjing Jiang, Haiwen Wang, Xiangwei Mu, Sheng Guan:
Logistics industry monitoring system based on wireless sensor network platform. 58-65
- Yalin Liu, Hong-Ning Dai, Qubeijian Wang, Mahendra Kumar Shukla, Muhammad Imran:
Unmanned aerial vehicle for internet of everything: Opportunities and challenges. 66-83
- Ambika K., M. Balasingh Moses:
An efficient SG-DACM framework for data integrity with user revocation in role based multiuser cloud environment. 84-92
- Wei-Che Chien, Shih-Yun Huang, Chin-Feng Lai, Han-Chieh Chao, M. Shamim Hossain, Ghulam Muhammad:
Multiple contents offloading mechanism in AI-enabled opportunistic networks. 93-103
- Slim Abdellatif, Pascal Berthou, Thierry Villemur, Armel Francklin Simo Tegueu:
Management of industrial communications slices: Towards the Application Driven Networking concept. 104-116
- Weiqiang Wang:
Deployment and optimization of wireless network node deployment and optimization in smart cities. 117-124
- Jianfeng Cui, Lixin Wang, Xin Zhao, Hongyi Zhang:
Towards predictive analysis of android vulnerability using statistical codes and machine learning for IoT applications. 125-131
- Kashif Naseer Qureshi, Sadia Din, Gwanggil Jeon, Francesco Piccialli:
Corrigendum to "Link quality and energy utilization based preferable next hop selection routing for wireless body area networks" [Comput. Commun. 149 (2020) 382-392]. 132
- S. Kokilavani Sankaralingam, N. Sathishkumar Nagarajan, A. S. Narmadha:
Energy aware decision stump linear programming boosting node classification based data aggregation in WSN. 133-142
- Yoney Kirsal Ever:
A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications. 143-149
- Waleed Ejaz, Arslan Ahmed, Aliza Mushtaq, Mohamed Ibnkahla:
Energy-efficient task scheduling and physiological assessment in disaster management using UAV-assisted networks. 150-157 - Wanyi Zhang, Xiuhua Fu, Wei Li:
The intelligent vehicle target recognition algorithm based on target infrared features combined with lidar. 158-165
- Madhurima Buragohain, Sukumar Nandi:
Quality of Service provisioning in Named Data Networking via PIT entry reservation and PIT replacement policy. 166-183
- Yalin Liu, Hong-Ning Dai, Hao Wang, Muhammad Imran, Xiaofen Wang, Muhammad Shoaib:
UAV-enabled data acquisition scheme with directional wireless energy transfer for Internet of Things. 184-196
- Juxia Xiong, Jinzhao Wu:
Construction of information network vulnerability threat assessment model for CPS risk assessment. 197-204
- Elham Moridi, Majid Haghparast, Mehdi Hosseinzadeh, Somaye Jafarali Jassbi:
Fault management frameworks in wireless sensor networks: A survey. 205-226
- Qiangyi Li, Ningzhong Liu:
Monitoring area coverage optimization algorithm based on nodes perceptual mathematical model in wireless sensor networks. 227-234
- S. Malathi, K. Elango:
Implementation of dead beat controller using Particle Swarm Optimization for software defined network. 235-243
- Gang Hou, Lizhu Chen:
D2D communication mode selection and resource allocation in 5G wireless networks. 244-251
- Max Alaluna, Luís Ferrolho, José Rui Figueira, Nuno Neves, Fernando M. V. Ramos:
Secure multi-cloud virtual network embedding. 252-265
- Stefano Ferretti, Gabriele D'Angelo:
Special Issue on Cryptocurrencies and Blockchains for Distributed Systems. 266
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.