Editorial Board
Optimized device centric aggregation mechanisms for mobile devices with multiple wireless interfaces
Multipath mobile data offloading of deadline assurance with policy and charging control in cellular/WiFi networks
A secure ECC-based privacy preserving data aggregation scheme for smart grids
A general framework to design secure cloud storage protocol using homomorphic encryption scheme
EMGR: Energy-efficient multicast geographic routing in wireless sensor networks
Rethinking robust and accurate application protocol identification
Randomizing TCP payload size for TCP fairness in data center networks
Software defined network inference with evolutionary optimal observation matrices
Online assignment of non-SDN virtual network nodes to a physical SDN
CGR: Centrality-based green routing for Low-power and Lossy Networks
EAODR: A novel routing algorithm based on the Modified Temporal Graph network model for DTN-based Interplanetary Networks
Implementation experience in multi-domain SDN: Challenges, consolidation and future directions
A key agreement protocol with partial backward confidentiality
Internet traffic classification based on expanding vector of flow
User-aware partitioning algorithm for mobile cloud computing based on maximum graph cuts
Towards optimal buffer management for streams with packet dependencies
Optimising channel assignment to prevent flow starvation and improve fairness for planning single radio WMNs in built environments
Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing
3-ent (resilient, intelligent, and efficient) medium access control for full-duplex, jamming-aware, directional airborne networks
MARS: From traffic containment to network reconfiguration in malware-analysis systems
Resource allocation and cell selection framework for LTE-Unlicensed femtocell networks
An opportunistic scheduling algorithm using aged CSI in massive MIMO systems
Effective information transmission based on socialization nodes in opportunistic networks
An anonymous authentication scheme for multi-domain machine-to-machine communication in cyber-physical systems
Outlier detection approaches for wireless sensor networks: A survey