1389-1286

Computer Networks (CN) - Volume 178 论文列表

本期论文列表
Editorial Board

Design of secure authentication protocol for dynamic user addition in distributed Internet-of-Things

5GUK Exchange: Towards sustainable end-to-end multi-domain orchestration of softwarized 5G networks

PrePass: Load balancing with data plane resource constraints using commodity SDN switches

On formulation of online algorithm and framework of near-optimally tractable eviction for nonuniform caches

TruSD: Trust framework for service discovery among IoT devices

Network service topology: Formalization, taxonomy and the CUSTOM specification model

An energy-efficient distributed adaptive cooperative routing based on reinforcement learning in wireless multimedia sensor networks

Node importance evaluation based on neighborhood structure hole and improved TOPSIS

Content to cash: Understanding and improving crowdsourced live video broadcasting services with monetary donations

pSMART: A lightweight, privacy-aware service function chain orchestration in multi-domain NFV/SDN

Secure over-the-air software updates in connected vehicles: A survey

Discrimination-aware trust management for social internet of things

SUTSEC: SDN Utilized trust based secure clustering in IoT

The partial computation offloading strategy based on game theory for multi-user in mobile edge computing environment

Priority-based initial access for URLLC traffic in massive IoT networks: Schemes and performance analysis

A new strategy for packets scheduling in cognitive radio internet of things

Power allocation and resource assignment for secure D2D communication underlaying cellular networks: A Tabu search approach

Classification of data aggregation functions in wireless sensor networks

Fast and accurate analytical tools to estimate network capacity for URLLC in 5G systems

Cloud based security on outsourcing using blockchain in E-health systems

A framework for mobile relay node selection for serving outdoor cell edge users

Group authentication protocol based on aggregated signatures for D2D communication

Accurate and fast URL phishing detector: A convolutional neural network approach

Corridor segmentation for automatic robot navigation in indoor environment using edge devices