default search action
Computer Communications, Volume 182
Volume 182, January 2022
- Anix Anbiah, Krishna M. Sivalingam:
Efficient failure recovery techniques for segment-routed networks. 1-12 - Jameel Ali, Majid Altamimi:
Energy consumption model for data transfer in smartphone. 13-21
- Yanrong Lu, Dawei Zhao:
Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service. 22-30
- Sulaiman Khan, Anwar Hussain, Shah Nazir, Fazlullah Khan, Ammar Oad, Mohammad Dahman Alshehri:
Efficient and reliable hybrid deep learning-enabled model for congestion control in 5G/6G networks. 31-40
- Xiaopeng Yao, Yue Gu, Chonglin Gu, Hejiao Huang:
Fast controlling of rumors with limited cost in social networks. 41-51
- Liang Zhao, Chunyang Mo, Jiajun Ma, Zhikui Chen, Chenhui Yao:
LSTM-MFCN: A time series classifier based on multi-scale spatial-temporal features. 52-59
- Peng Dai, Yawen Wang, Dahai Jin, Yunzhan Gong, Wenjin Yang:
An improving approach to analyzing change impact of C programs. 60-71
- Pandit Byomakesha Dash, Bighnaraj Naik, Janmenjoy Nayak, S. Vimal:
Socio-economic factor analysis for sustainable and smart precision agriculture: An ensemble learning approach. 72-87
- Noura Aljeri, Azzedine Boukerche:
A novel proactive controller deployment protocol for 5G-enabled software-defined Vehicular Networks. 88-97
- Michael Markovitch, Gabriel Scalosub:
Bounded delay scheduling with packet dependencies. 98-109
- Zhan Shi, Huina Wei, Jian Zhu:
Edge computing-empowered task offloading in PLC-wireless integrated network based on matching with quota. 110-116
- Wanli Xue, Yiran Shen, Chengwen Luo, Weitao Xu, Wen Hu, Aruna Seneviratne:
A differential privacy-based classification system for edge computing in IoT. 117-128
- Yehia Ibrahim Alzoubi, Ahmad Salah Al-Ahmad, Hasan Kahtan:
Blockchain technology as a Fog computing security and privacy solution: An overview. 129-152
- Ali El Kamel, Hamdi Eltaief, Habib Youssef:
On-the-fly (D)DoS attack mitigation in SDN using Deep Neural Network-based rate limiting. 153-169
- Jian Zhu, Qian Li, Shi Ying:
SAAS parallel task scheduling based on cloud service flow load algorithm. 170-183
- Andrea Pimpinella, Marianna Repossi, Alessandro E. C. Redondi:
Unsatisfied today, satisfied tomorrow: A simulation framework for performance evaluation of crowdsourcing-based network monitoring. 184-197
- Sayed Qaiser Ali Shah, Farrukh Zeeshan Khan, Muneer Ahmad:
Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN. 198-211
- Jiamin Zheng, Shupan Li, Shengang Hao, Yuanzhang Li, Yu Zhang:
ZM-CTC: Covert timing channel construction method based on zigzag matrix. 212-222
- Md. Munjure Mowla, Iftekhar Ahmad, Daryoush Habibi, Quoc Viet Phung, M. Ishtiaque Aziz Zahed:
Green traffic backhauling in next generation wireless communication networks incorporating FSO/mmWave technologies. 223-237
- Yuyao Huang, Hui Shu, Fei Kang, Yan Guang:
Protocol Reverse-Engineering Methods and Tools: A Survey. 238-254 - Jingfu Lu, Jiuling Li:
Two-phase sample average approximation for video distribution strategy of edge computing in heterogeneous network. 255-267
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.