


default search action
Computer Communications, Volume 200
Volume 200, February 2023
- Indushree M, Manish Raj

, Vipul Kumar Mishra
, Shashidhara
, Ashok Kumar Das
, Vivekananda Bhat K.
:
Mobile-Chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks. 1-16 - Ruilin Lai

, Gansen Zhao:
Blockchain for achieving accountable outsourcing computations in edge computing. 17-29 - Ripon Patgiri

, Anupam Biswas, Sabuzima Nayak
:
deepBF: Malicious URL detection using learned Bloom Filter and evolutionary deep learning. 30-41 - Chandranshu Gupta

, Gaurav Varshney:
An improved authentication scheme for BLE devices with no I/O capabilities. 42-53 - Rathindra Nath Dutta

, Sasthi C. Ghosh
:
Mobility aware resource allocation for millimeter-wave D2D communications in presence of obstacles. 54-65 - Yuh-Shyan Chen

, Chih-Shun Hsu
, Hsiang-Ching Hung:
Optimizing communication and computational resource allocations in network slicing using twin-GAN-Based DRL for 5G hybrid C-RAN. 66-85
- Jun Jiang

, Fagui Liu, Wing W. Y. Ng
, Quan Tang, Guoxiang Zhong, Xuhao Tang, Bin Wang:
AERF: Adaptive ensemble random fuzzy algorithm for anomaly detection in cloud computing. 86-94
- Charles Kihungi Njogu

, Wang Yang
, Humphrey Waita Njogu
, Adrian Bosire:
BBR-With Enhanced Fairness (BBR-EFRA): A new enhanced RTT fairness for BBR congestion control algorithm. 95-103 - Peng Deng, Xiangyang Gong, Xirong Que:

A bandwidth-aware service migration method in LEO satellite edge computing network. 104-112
- Juan Marcos Ramirez, Fernando Díez Muñoz

, Pablo J. Rojo Maroni, Vincenzo Mancuso
, Antonio Fernández Anta:
Explainable machine learning for performance anomaly detection and classification in mobile networks. 113-131
- Yu Wu

, Jinzhan Gou, Honglei Ji
, Jianing Deng
:
Hierarchical mission replanning for multiple UAV formations performing tasks in dynamic situation. 132-148 - Yuzi Yi, Nafei Zhu, Jingsha He

, Anca Delia Jurcut
, Xiangjun Ma, Yehong Luo:
A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks. 149-160
- Chao Duan, Shuyue Zhang, Panpan Yin, Xingxing Li, Jun Luo:

SCMA-TPGAN: A new perspective on sparse codebook multiple access for UAV system. 161-170
- Shuo Yang, Xinran Zheng

, Guining Liu
, Xingjun Wang:
IBA: A secure and efficient device-to-device interaction-based authentication scheme for Internet of Things. 171-181 - Zhenhua Wang, Yan Guo, Ning Li, Shiguang Hu, Meng Wang:

Autonomous collaborative combat strategy of unmanned system group in continuous dynamic environment based on PD-MADDPG. 182-204

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














