Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Blockchain based resource allocation in cloud and distributed edge computing: A survey
Baranwal, Gaurav, Kumar, Dinesh, Vidyarthi, Deo Prakash
Published in Computer communications (01.09.2023)
Published in Computer communications (01.09.2023)
Get full text
Journal Article
Loading…
Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks
Muthanna, Mohammed Saleh Ali, Muthanna, Ammar, Rafiq, Ahsan, Hammoudeh, Mohammad, Alkanhel, Reem, Lynch, Stephen, Abd El-Latif, Ahmed A.
Published in Computer communications (01.02.2022)
Published in Computer communications (01.02.2022)
Get full text
Journal Article
Loading…
Path planning of unmanned vehicles based on adaptive particle swarm optimization algorithm
Zhao, Jiale, Deng, Chaoshuo, Yu, Huanhuan, Fei, Hansheng, Li, Deshun
Published in Computer communications (15.02.2024)
Published in Computer communications (15.02.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Secure Device-to-Device communications for 5G enabled Internet of Things applications
Gaba, Gurjot Singh, Kumar, Gulshan, Kim, Tai-Hoon, Monga, Himanshu, Kumar, Pardeep
Published in Computer communications (01.03.2021)
Published in Computer communications (01.03.2021)
Get full text
Journal Article
Loading…
A dynamic ensemble algorithm for anomaly detection in IoT imbalanced data streams
Jiang, Jun, Liu, Fagui, Liu, Yongheng, Tang, Quan, Wang, Bin, Zhong, Guoxiang, Wang, Weizheng
Published in Computer communications (01.10.2022)
Published in Computer communications (01.10.2022)
Get full text
Journal Article
Loading…
Towards security automation in Software Defined Networks
Yungaicela-Naula, Noe M., Vargas-Rosales, Cesar, Pérez-Díaz, Jesús Arturo, Zareei, Mahdi
Published in Computer communications (01.02.2022)
Published in Computer communications (01.02.2022)
Get full text
Journal Article
Loading…
Ambient intelligence approach: Internet of Things based decision performance analysis for intrusion detection
Ramana, T.V., Thirunavukkarasan, M., Mohammed, Amin Salih, Devarajan, Ganesh Gopal, Nagarajan, Senthil Murugan
Published in Computer communications (01.11.2022)
Published in Computer communications (01.11.2022)
Get full text
Journal Article
Loading…
Network intrusion detection based on IE-DBN model
Jia, Huaping, Liu, Jun, Zhang, Min, He, Xiaohu, Sun, Weixi
Published in Computer communications (01.10.2021)
Published in Computer communications (01.10.2021)
Get full text
Journal Article
Loading…
Privacy-preserving using homomorphic encryption in Mobile IoT systems
Ren, Wang, Tong, Xin, Du, Jing, Wang, Na, Li, Shan Cang, Min, Geyong, Zhao, Zhiwei, Bashir, Ali Kashif
Published in Computer communications (01.01.2021)
Published in Computer communications (01.01.2021)
Get full text
Journal Article