1389-1286

Computer Networks (CN) - Volume 217 论文列表

本期论文列表
Editorial Board

A sub-action aided deep reinforcement learning framework for latency-sensitive network slicing

Calculation of utility of network services based on state manifolds

Smart contract vulnerability detection combined with multi-objective detection

Application placement with shared monitoring points in multi-purpose IoT wireless sensor networks

A secure relay selection scheme based on cooperative jamming for Underwater Acoustic Sensor Networks

Accurate mobile-app fingerprinting using flow-level relationship with graph neural networks

A tenant-driven slicing enforcement scheme based on Pervasive Intelligence in the Radio Access Network

Fault-tolerant resource allocation model for service function chains with joint diversity and redundancy

Deep learning approaches for vehicle type classification with 3-D magnetic sensor

Energy-efficient full-duplex D2D for SWIPT-empowered underlay cellular networks using a deep neural network

An integrity-preserving technique for range queries over data streams in two-tier sensor networks

Robust and energy-efficient user association and traffic routing in B5G HetNets

HDPoA: Honesty-based distributed proof of authority via scalable work consensus protocol for IoT-blockchain applications

Optimizing the operator’s economy in multi-tier cellular networks with underlaid D2D communications

Area coverage-based worker recruitment under geo-indistinguishability

Graphical Modelling and Optimization of RAN function split deployed through UAVs

Dynamic power allocation in cellular network based on multi-agent double deep reinforcement learning

Truthful auction mechanisms for VNF chain provisioning and allocation across geo-distributed datacenters

A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices

Pricing-based resource allocation in three-tier edge computing for social welfare maximization

Analyzing Count Min Sketch with Conservative Updates

F2DC: Android malware classification based on raw traffic and neural networks

Network intrusion detection based on DNA spatial information

Intelligent Horizontal Autoscaling in Edge Computing using a Double Tower Neural Network

PoiEvent: An approach to extract the persistent and destructive routing events

Combining multi-RIS and relay for performance improvement of multi-user NOMA systems

A frame work of handover analysis for randomly deployed heterogeneous networks

Building a Digital Twin for network optimization using Graph Neural Networks

A novel multidimensional trust evaluation and fusion mechanism in fog-based Internet of Things

Satellite multi-beam multicast support for an efficient community-based CDN

DOCUS-DDoS detection in SDN using modified CUSUM with flash traffic discrimination and mitigation

ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags

AI-driven, QoS prediction for V2X communications in beyond 5G systems

Self-backhauling failure mitigation using 5G new radio

A real-time IoT-based botnet detection method using a novel two-step feature selection technique and the support vector machine classifier

RouteChain: Towards Blockchain-based secure and efficient BGP routing

Self-healing and optimal fault tolerant routing in wireless sensor networks using genetical swarm optimization

A review on Virtualized Infrastructure Managers with management and orchestration features in NFV architecture

Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN

An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing

Energy aware resource control mechanism for improved performance in future green 6G networks