


default search action
Computer Networks, Volume 137
Volume 137, June 2018
- Yu-Ting Lin
, Thomas Bonald, Salah-Eddine Elayoubi:
Flow-level traffic model for adaptive streaming services in mobile networks. 1-16
- Ryoichi Shinkuma
, Yusuke Tanaka, Yoshinobu Yamada, Eiji Takahashi, Takeo Onishi:
User instruction mechanism for temporal traffic smoothing in mobile networks. 17-26
- Muhammad Awais Javed
, Sherali Zeadally, Zara Hamid:
Trust-based security adaptation mechanism for Vehicular Sensor Networks. 27-36 - Sabrina Sicari, Alessandra Rizzardi, Daniele Miorandi, Alberto Coen-Porisini:
REATO: REActing TO Denial of Service attacks in the Internet of Things. 37-48 - Chunsheng Xin, Sharif Ullah
, Min Song, Zhao Wu, Qiong Gu, Huanqing Cui:
Throughput oriented lightweight near-optimal rendezvous algorithm for cognitive radio networks. 49-60 - Zhengyu Zhu, Zhongyong Wang, Zheng Chu, Di Zhang, Byonghyo Shim
:
Robust energy harvest balancing optimization with V2X-SWIPT over MISO secrecy channel. 61-68
- Mahdi Zareei
, César Vargas Rosales
, Rafaela Villalpando Hernandez
, Leyre Azpilicueta
, Mohammad Hossein Anisi
, Mubashir Husain Rehmani
:
The effects of an Adaptive and Distributed Transmission Power Control on the performance of energy harvesting sensor networks. 69-82 - Suman Bhunia
, Paulo Alexandre Regis
, Shamik Sengupta:
Distributed adaptive beam nulling to survive against jamming in 3D UAV mesh networks. 83-97
- Danda B. Rawat
, Reham Alsabet
, Chandra Bajracharya, Min Song:
On the performance of cognitive internet-of-vehicles with unlicensed user-mobility and licensed user-activity. 98-106
- N. Anand
, Sarath Babu
, B. S. Manoj
:
On detecting compromised controller in software defined networks. 107-118 - Sungjin Kim
, Jinkook Kim, Seokwoo Nam, Dohoon Kim:
WebMon: ML- and YARA-based malicious webpage detection. 119-131 - Yunchong Guan
, Weimin Lei, Wei Zhang, Shaowei Liu, Hao Li:
Scalable orchestration of software defined service overlay network for multipath transmission. 132-146
- Ali Safa Sadiq
, Suleman Khan
, Kayhan Zrar Ghafoor
, Mohsen Guizani, Seyedali Mirjalili
:
Transmission power adaption scheme for improving IoV awareness exploiting: evaluation weighted matrix based on piggybacked information. 147-159 - Wei Guo
, Mahendran Veeramani
, Sridhar Radhakrishnan
:
Join and spilt TCP for SDN networks: Architecture, implementation, and evaluation. 160-172 - Mohammed Amer, Anthony Busson, Isabelle Guérin Lassous:
Association optimization based on access fairness for Wi-Fi networks. 173-188

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.