1389-1286

Computer Networks (CN) - Volume 201 论文列表

本期论文列表
Editorial Board

A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things

Deep Learning (DL)-based adaptive transport layer control in UAV Swarm Networks

A worldwide study on the geographic locality of Internet routes

Energy-efficient collaborative optimization for VM scheduling in cloud computing

Precise: Predictive Content Dissemination Scheme exploiting realistic mobility patterns

Structured nonnegative matrix factorization for traffic flow estimation of large cloud networks

Charging UAV deployment for improving charging performance of wireless rechargeable sensor networks via joint optimization approach

Device-to-device group authentication compatible with 5G AKA protocol

Sustaining accurate detection of phishing URLs using SDN and feature selection approaches

Distributed scheduling method for multiple workflows with parallelism prediction and DAG prioritizing for time constrained cloud applications

S2H: Hypervisor as a setter within Virtualized Network I/O for VM isolation on cloud platform

Chain RTS/CTS scheme with Opportunistic Channel Allocation

Performance optimization for UWB communication network under IEEE 802.15.4a channel conditions

Content placement in networks of similarity caches

Distinguishing malicious programs based on visualization and hybrid learning algorithms

Analyzing Blockchain integrated architectures for effective handling of IoT-ecosystem transactions

A DNN-based estimate of the PRACH traffic load for massive IoT scenarios in 5G networks and beyond

A network operator-biased approach for multi-service network function placement in a 5G network slicing architecture

Power efficient mobile small cell placement for network-coded cooperation in UDNs

Hierarchical feature block ranking for data-efficient intrusion detection modeling

OrderSketch: An Unbiased and Fast Sketch for Frequency Estimation of Data Streams

A survey on recent contention-free MAC protocols for static and mobile wireless decentralized networks in IoT

Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers

Friendship selection and management in social internet of things: A systematic review

A survey on sleep mode techniques for ultra-dense networks in 5G and beyond

CNN-SSDI: Convolution neural network inspired surveillance system for UAVs detection and identification

Detection of mobile network abnormality using deep learning models on massive network measurement data

Secure IoT edge: Threat situation awareness based on network traffic

GramMatch: An automatic protocol feature extraction and identification system

App identification based on encrypted multi-smartphone sources traffic fingerprints

Proof of Learning (PoLe): Empowering neural network training with consensus building on blockchains