Editorial Board
Distributed user-to-multiple access points association through deep learning for beyond 5G
ASRPH: Application Specific Routing Protocol for Health care
Achieving high reliability and throughput in software defined networks
Joint position and clock tracking of wireless nodes
Proactive restoration with low re-provisioning in Elastic Optical Networks
Routing and spectrum assignment: A metaheuristic for hybrid ordering selection in elastic optical networks
Policy-rich interdomain routing with local coordination
A communication-channel-based method for detecting deeply camouflaged malicious traffic
A comprehensive survey on DNS tunnel detection
Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT
Intrusion detection for capsule networks based on dual routing mechanism
MOVES: A MemOry-based VEhicular Social forwarding technique
Secure beamforming with nonorthogonal multiple access transmission in cooperative CR networks for Internet of Things
Joint beamforming and user association with reduced CSI signaling in mobile environments: A Deep Q-learning approach
Powder: Platform for Open Wireless Data-driven Experimental Research
Low-delay high-rate operation of 802.11ac WLAN downlink: Nonlinear controller analysis & design
Choose a correct marking position: ECN should be freed from tail mark
Energy efficient routing protocol using exponentially-ant lion whale optimization algorithm in wireless sensor networks
Error Correcting Network Codes
Network cost optimization-based capacitated controller deployment for SDN
Performance modeling of multipath mobile data offloading in cellular/WiFi networks with bandwidth uncertainty
Achieve space-efficient key management in lightning network
Optimization of ultra-reliable low-latency communication systems
Performance evaluation of CoAP and MQTT with security support for IoT environments
A systematic methodology for continuous WLAN abundance and security analysis
Computation offloading and content caching and delivery in Vehicular Edge Network: A survey
NFV security survey in 5G networks: A three-dimensional threat taxonomy
Effective *-flow schedule for optical circuit switching based data center networks: A comprehensive survey
Dataset of attacks on a live enterprise VoIP network for machine learning based intrusion detection and prevention systems
A Latin rectangles-based TSCH scheduling and interference mitigation design
Reinforcement learning approaches for efficient and secure blockchain-powered smart health systems
Q-learning based energy-efficient and void avoidance routing protocol for underwater acoustic sensor networks
Federated deep reinforcement learning based secure data sharing for Internet of Things
Beyond 5G for digital twins of UAVs