Editorial Board
A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things
Deep Learning (DL)-based adaptive transport layer control in UAV Swarm Networks
A worldwide study on the geographic locality of Internet routes
Energy-efficient collaborative optimization for VM scheduling in cloud computing
Precise: Predictive Content Dissemination Scheme exploiting realistic mobility patterns
Structured nonnegative matrix factorization for traffic flow estimation of large cloud networks
Charging UAV deployment for improving charging performance of wireless rechargeable sensor networks via joint optimization approach
Device-to-device group authentication compatible with 5G AKA protocol
Sustaining accurate detection of phishing URLs using SDN and feature selection approaches
Distributed scheduling method for multiple workflows with parallelism prediction and DAG prioritizing for time constrained cloud applications
S2H: Hypervisor as a setter within Virtualized Network I/O for VM isolation on cloud platform
Chain RTS/CTS scheme with Opportunistic Channel Allocation
Performance optimization for UWB communication network under IEEE 802.15.4a channel conditions
Content placement in networks of similarity caches
Distinguishing malicious programs based on visualization and hybrid learning algorithms
Analyzing Blockchain integrated architectures for effective handling of IoT-ecosystem transactions
A DNN-based estimate of the PRACH traffic load for massive IoT scenarios in 5G networks and beyond
A network operator-biased approach for multi-service network function placement in a 5G network slicing architecture
Power efficient mobile small cell placement for network-coded cooperation in UDNs
Hierarchical feature block ranking for data-efficient intrusion detection modeling
OrderSketch: An Unbiased and Fast Sketch for Frequency Estimation of Data Streams
A survey on recent contention-free MAC protocols for static and mobile wireless decentralized networks in IoT
Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers
Friendship selection and management in social internet of things: A systematic review
A survey on sleep mode techniques for ultra-dense networks in 5G and beyond
CNN-SSDI: Convolution neural network inspired surveillance system for UAVs detection and identification
Detection of mobile network abnormality using deep learning models on massive network measurement data
Secure IoT edge: Threat situation awareness based on network traffic
GramMatch: An automatic protocol feature extraction and identification system
App identification based on encrypted multi-smartphone sources traffic fingerprints
Proof of Learning (PoLe): Empowering neural network training with consensus building on blockchains