default search action
Journal of Network and Computer Applications, Volume 125
Volume 125, January 2019
- Inaki Val, Ander Etxabe, Raul Torrego, Pedro Manuel Rodriguez, Cristina Cruces, Víctor Díez, Mikel Mendicute, Aitor Arriola:
Design, analysis and implementation of a time-bounded spectrum handoff algorithm for real-time industrial wireless sensor and actuator networks. 1-16
- Seema Kharb, Anita Singhrova:
Fuzzy based priority aware scheduling technique for dense industrial IoT networks. 17-27 - V. Indu, Sabu M. Thampi:
A nature - inspired approach based on Forest Fire model for modeling rumor propagation in social networks. 28-41 - Srikant Manas Kala, Vanlin Sathya, M. Pavan Kumar Reddy, Betty Lala, Bheemarjuna Reddy Tamma:
A socio-inspired CALM approach to channel assignment performance prediction and WMN capacity estimation. 42-66 - Vishal Sharma, Jianfeng Guan, Jiyoon Kim, Soonhyun Kwon, Ilsun You, Francesco Palmieri, Mario Collotta:
MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks. 67-81
- Zhitao Guan, Yue Zhang, Longfei Wu, Jun Wu, Jing Li, Yinglong Ma, Jingjing Hu:
APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. 82-92 - Jinfang Jiang, Guangjie Han, Hao Wang, Mohsen Guizani:
A survey on location privacy protection in Wireless Sensor Networks. 93-114 - Anil Kumar Rangisetti, Bheemarjuna Reddy Tamma:
Interference and QoS aware cell switch-off strategy for software defined LTE HetNets. 115-129 - Chao Bu, Xingwei Wang, Hui Cheng, Min Huang, Keqin Li:
Routing as a service (RaaS): An open framework for customizing routing services. 130-145 - Alper Bereketli, Muharrem Tümçakir, Burcu Yeni:
P-AUV: Position aware routing and medium access for ad hoc AUV networks. 146-154 - Kostas Kolomvatsos:
Time-optimized management of mobile IoT nodes for pervasive applications. 155-167 - Zhuhua Liao, Zengde Teng, Jian Zhang, Yizhi Liu, Hao Xiao, Aiping Yi:
A Semantic Concast service for data discovery, aggregation and processing on NDN. 168-178
- Garima Chopra, Rakesh Kumar Jha, Sanjeev Jain:
RBA: Region Based Algorithm for secure harvesting in Ultra Dense Network. 179-189 - Zhen Liu, Ruoyu Wang, Nathalie Japkowicz, Yongming Cai, Deyu Tang, Xianfa Cai:
Mobile app traffic flow feature extraction and selection for improving classification robustness. 190-208 - Shuhua Deng, Xing Gao, Zebin Lu, Zhengfa Li, Xieping Gao:
DoS vulnerabilities and mitigation strategies in software-defined networks. 209-219 - Xiuquan Qiao, Pei Ren, Junliang Chen, Wei Tan, M. Brian Blake, Wangli Xu:
Session persistence for dynamic web applications in Named Data Networking. 220-235
- Weijie Han, Jingfeng Xue, Yong Wang, Zhenyan Liu, Zixiao Kong:
MalInsight: A systematic profiling based malware detection framework. 236-250 - Imran Makhdoom, Mehran Abolhasan, Haider Abbas, Wei Ni:
Blockchain's adoption in IoT: The challenges, and a way forward. 251-279
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.