1389-1286

Computer Networks (CN) - Volume 197 论文列表

本期论文列表
Editorial Board

Distributed user-to-multiple access points association through deep learning for beyond 5G

ASRPH: Application Specific Routing Protocol for Health care

Achieving high reliability and throughput in software defined networks

Joint position and clock tracking of wireless nodes

Proactive restoration with low re-provisioning in Elastic Optical Networks

Routing and spectrum assignment: A metaheuristic for hybrid ordering selection in elastic optical networks

Policy-rich interdomain routing with local coordination

A communication-channel-based method for detecting deeply camouflaged malicious traffic

A comprehensive survey on DNS tunnel detection

Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT

Intrusion detection for capsule networks based on dual routing mechanism

MOVES: A MemOry-based VEhicular Social forwarding technique

Secure beamforming with nonorthogonal multiple access transmission in cooperative CR networks for Internet of Things

Joint beamforming and user association with reduced CSI signaling in mobile environments: A Deep Q-learning approach

Powder: Platform for Open Wireless Data-driven Experimental Research

Low-delay high-rate operation of 802.11ac WLAN downlink: Nonlinear controller analysis & design

Choose a correct marking position: ECN should be freed from tail mark

Energy efficient routing protocol using exponentially-ant lion whale optimization algorithm in wireless sensor networks

Error Correcting Network Codes

Network cost optimization-based capacitated controller deployment for SDN

Performance modeling of multipath mobile data offloading in cellular/WiFi networks with bandwidth uncertainty

Achieve space-efficient key management in lightning network

Optimization of ultra-reliable low-latency communication systems

Performance evaluation of CoAP and MQTT with security support for IoT environments

A systematic methodology for continuous WLAN abundance and security analysis

Computation offloading and content caching and delivery in Vehicular Edge Network: A survey

NFV security survey in 5G networks: A three-dimensional threat taxonomy

Effective *-flow schedule for optical circuit switching based data center networks: A comprehensive survey

Dataset of attacks on a live enterprise VoIP network for machine learning based intrusion detection and prevention systems

A Latin rectangles-based TSCH scheduling and interference mitigation design

Reinforcement learning approaches for efficient and secure blockchain-powered smart health systems

Q-learning based energy-efficient and void avoidance routing protocol for underwater acoustic sensor networks

Federated deep reinforcement learning based secure data sharing for Internet of Things

Beyond 5G for digital twins of UAVs