Editorial Board
A sub-action aided deep reinforcement learning framework for latency-sensitive network slicing
Calculation of utility of network services based on state manifolds
Smart contract vulnerability detection combined with multi-objective detection
Application placement with shared monitoring points in multi-purpose IoT wireless sensor networks
A secure relay selection scheme based on cooperative jamming for Underwater Acoustic Sensor Networks
Accurate mobile-app fingerprinting using flow-level relationship with graph neural networks
A tenant-driven slicing enforcement scheme based on Pervasive Intelligence in the Radio Access Network
Fault-tolerant resource allocation model for service function chains with joint diversity and redundancy
Deep learning approaches for vehicle type classification with 3-D magnetic sensor
Energy-efficient full-duplex D2D for SWIPT-empowered underlay cellular networks using a deep neural network
An integrity-preserving technique for range queries over data streams in two-tier sensor networks
Robust and energy-efficient user association and traffic routing in B5G HetNets
HDPoA: Honesty-based distributed proof of authority via scalable work consensus protocol for IoT-blockchain applications
Optimizing the operator’s economy in multi-tier cellular networks with underlaid D2D communications
Area coverage-based worker recruitment under geo-indistinguishability
Graphical Modelling and Optimization of RAN function split deployed through UAVs
Dynamic power allocation in cellular network based on multi-agent double deep reinforcement learning
Truthful auction mechanisms for VNF chain provisioning and allocation across geo-distributed datacenters
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices
Pricing-based resource allocation in three-tier edge computing for social welfare maximization
Analyzing Count Min Sketch with Conservative Updates
F2DC: Android malware classification based on raw traffic and neural networks
Network intrusion detection based on DNA spatial information
Intelligent Horizontal Autoscaling in Edge Computing using a Double Tower Neural Network
PoiEvent: An approach to extract the persistent and destructive routing events
Combining multi-RIS and relay for performance improvement of multi-user NOMA systems
A frame work of handover analysis for randomly deployed heterogeneous networks
Building a Digital Twin for network optimization using Graph Neural Networks
A novel multidimensional trust evaluation and fusion mechanism in fog-based Internet of Things
Satellite multi-beam multicast support for an efficient community-based CDN
DOCUS-DDoS detection in SDN using modified CUSUM with flash traffic discrimination and mitigation
ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags
AI-driven, QoS prediction for V2X communications in beyond 5G systems
Self-backhauling failure mitigation using 5G new radio
A real-time IoT-based botnet detection method using a novel two-step feature selection technique and the support vector machine classifier
RouteChain: Towards Blockchain-based secure and efficient BGP routing
Self-healing and optimal fault tolerant routing in wireless sensor networks using genetical swarm optimization
A review on Virtualized Infrastructure Managers with management and orchestration features in NFV architecture
Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN
An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing
Energy aware resource control mechanism for improved performance in future green 6G networks