1389-1286

Computer Networks (CN) - Volume 198 论文列表

本期论文列表
Editorial Board

Throughput analysis in a millimeter-wave network for a hybrid unsaturated RCAP/CTAP MAC protocol

Designing a multi-layer edge-computing platform for energy-efficient and delay-aware offloading in vehicular networks

Blockage tolerance in roadside millimeter-wave backhaul networks

Group authentication for cloud-to-things computing: Review and improvement

Failure-resilient DAG task scheduling in edge computing

MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion

An enhanced symmetric-key based 5G-AKA protocol

Heterogeneous SDN controller placement problem—The Wi-Fi and 4G LTE-U case

Q-FANET: Improved Q-learning based routing protocol for FANETs

An adaptive solar-aware framework and strategy for outdoor deployment of WSN

Learning-based hybrid routing for scalability in software defined networks

Multiple-level threshold load balancing in distributed SDN controllers

Architecture design and performance analysis of a novel memory system for high-bandwidth onboard switching fabric

Probabilistic probe selection algorithm for fault diagnosis in communication networks

On the performance investigation of a fast optical switches based optical high performance computing infrastructure

Multi-timescale and multi-centrality layered node selection for efficient traffic monitoring in SDNs

Understanding commercial 5G and its implications to (Multipath) TCP

DMatrix: Toward fast and accurate queries in graph stream

MDCHD: A novel malware detection method in cloud using hardware trace and deep learning

Few-shot website fingerprinting attack

A game-theoretic joint optimal pricing and resource allocation for Mobile Edge Computing in NOMA-based 5G networks and beyond

Towards securing Duplicate Address Detection using P4

A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest – RFTRUST

5G-Flow: A unified Multi-RAT RAN architecture for beyond 5G networks

Beam searching for mmWave networks with sub-6 GHz WiFi and inertial sensors inputs: An experimental study

Swarm intelligence RFID network planning using multi-antenna readers for asset tracking in hospital environments

Point coverage with heterogeneous sensor networks: A robust optimization approach under target location uncertainty

Smart computational offloading for mobile edge computing in next-generation Internet of Things networks

A five-step drone collaborative planning approach for the management of distributed spatial events and vehicle notification using multi-agent systems and firefly algorithms

Natural language processing for web browsing analytics: Challenges, lessons learned, and opportunities

Blockchain-based Initiatives: Current state and challenges

Efficient side-channel attacks beyond divide-and-conquer strategy

Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis

Enhanced cache attack on AES applicable on ARM-based devices with new operating systems