Volume 206, April 2022
Security&privacy issues and challenges in NoSQL databases.

Sabrina Sicari Alessandra Rizzardi Alberto Coen-Porisini

Efficient spam and phishing emails filtering based on deep learning.

Safaa Magdy Yasmine Abouelseoud Mervat Mikhail

Collision-free optimal packet scheduling algorithm for multi-hop wireless IoT networks.

Hak-Jin Kim Marie S. Kim Seung-Jae Han

An integrated approach for energy efficient handover and key distribution protocol for secure NC-enabled small cells.

Vipindev Adat Vasudevan Muhammad Tayyab George P. Koudouridis Xavier Gelabert Ilias Politis

SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones.

Mohamed A. El-Zawawy Alessandro Brighente Mauro Conti

A comprehensive survey of vulnerability and information security in SDN.

Raktim Deb Sudipta Roy

PARFAIT: Privacy-preserving, secure, and low-delay service access in fog-enabled IoT ecosystems.

Savio Sciancalepore

Mobile edge computing for V2X architectures and applications: A survey.

Lucas Bréhon-Grataloup Rahim Kacimi André-Luc Beylot

Toward scalable graph-based security analysis for cloud networks.

Abdulhakim Sabur Ankur Chowdhary Dijiang Huang Adel Alshamrani

A blockchain-based and privacy-preserved authentication scheme for inter-constellation collaboration in Space-Ground Integrated Networks.

Ting Xiong Ran Zhang Jiang Liu Tao Huang Yunjie Liu F. Richard Yu

Speeding up block propagation in Bitcoin network: Uncoded and coded designs.

Lihao Zhang Taotao Wang Soung Chang Liew

BBRv2+: Towards balancing aggressiveness and fairness with delay-based bandwidth probing.

Furong Yang Qinghua Wu Zhenyu Li Yanmei Liu Giovanni Pau Gaogang Xie

Throughput and latency in the distributed Q-learning random access mMTC networks.

Giovanni Maciel Ferreira Silva Taufik Abrão

VideoTrain++: GAN-based adaptive framework for synthetic video traffic generation.

Chamara Madarasingha Shashika Ranga Muramudalige Guillaume Jourjon Anura P. Jayasumana Kanchana Thilakarathna

Metaheuristic enabled modified hidden Markov model for traffic flow prediction.

Charushila Raskar Shikha Nema

State-of-the-art survey of artificial intelligent techniques for IoT security.

Tariq Ahamed Ahanger Abdullah Aljumah Mohammed Atiquzzaman

Dissecting traffic fingerprinting CNNs with filter activations.

Thilini Dahanayaka Guillaume Jourjon Suranga Seneviratne

Understanding Internet of Things malware by analyzing endpoints in their static artifacts.

Jinchun Choi Afsah Anwar Abdulrahman Alabduljabbar Hisham Alasmary Jeffrey Spaulding An Wang Songqing Chen DaeHun Nyang Amro Awad David Mohaisen

Path stability in partially deployed secure BGP routing.

Yan Yang Xingang Shi Qiang Ma Yahui Li Xia Yin Zhiliang Wang

Optimized task scheduling for cost-latency trade-off in mobile fog computing using fuzzy analytical hierarchy process.

Entesar Hosseini Mohsen Nickray Shamsollah Ghanbari

Self-play learning strategies for resource assignment in Open-RAN networks.

Xiaoyang Wang Jonathan D. Thomas Robert J. Piechocki Shipra Kapoor Raúl Santos-Rodríguez Arjun Parekh

On the prediction of large-scale road-network constrained trajectories.

Roniel S. de Sousa Azzedine Boukerche Antonio A. F. Loureiro