Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 238, Issue CJan 2024
Bibliometrics
Skip Table Of Content Section
Research Articles
research-article
Optimal Energy-efficient Resource Allocation and Fault Tolerance scheme for task offloading in IoT-FoG Computing Networks
Abstract

Due to technology development in the recent past, it is observed that an exponential growth in the usage of high speed intelligent devices which includes smart objects, smart home, smart vehicles etc. Therefore, for the efficient transmission ...

research-article
An efficient topology partitioning algorithm for system-level parallel simulation of mega satellite constellation communication networks
Abstract

Satellite Internet, as an important component of the integrated space-ground information network, is a hot research hotspot nowadays. Many scholars have undertaken research in the areas of constellation networking design, network protocol design, ...

research-article
EPIoT: Enhanced privacy preservation based blockchain mechanism for internet-of-things
Abstract

With the increasing popularity of the Internet of things (IoT) and giving the end users the opportunity of collecting and analyzing the data by these IoT devices give rise to ultimate privacy concern and is attracting significant attention ...

research-article
Collaborative computation offloading for scheduling emergency tasks in SDN-based mobile edge computing networks
Abstract

Due to the growing demand for time-intensive tasks, several tasks coexist, some of which last for a long time or only occur once in a while, such as emergencies. Emergencies such as natural disasters, accidents or medical emergencies require ...

research-article
QoS-based resource allocation for uplink NOMA networks
Abstract

Nowadays, several next-generation multiple access technologies are proposed, and non-orthogonal multiple access (NOMA) is one of the candidates. In NOMA systems, since the utilization of successive interference cancellation (SIC), the SIC order ...

research-article
Joint energy and spectral optimization in Heterogeneous Vehicular Network
Abstract

With the latest developments in both the automotive and communications industries, especially concerning the emerging 5G networks, IoV, and the adoption of Vehicle-to-Everything (V2X) connectivity, there has been a shift towards the establishment ...

research-article
Reuse-based online joint routing and scheduling optimization mechanism in deterministic networks
Abstract

Deterministic networks plan the entire network traffic and calculate the scheduling time to meet the critical traffic requirements of specific domains, enabling real-time and deterministic interaction of massive data. However, in dynamic ...

research-article
TEA-RFFI: Temperature adjusted radio frequency fingerprint-based smartphone identification
Abstract

Recently, radio frequency fingerprints (RFFs) have been widely applied for smartphone identification, since RFFs are distinguishable and hard to imitate. Compared with other types of RFFs, carrier frequency offset (CFO) in Wi-Fi signals is more ...

research-article
κ-Coverage Reliability for Wireless Multihop Network incorporating Boundary Effect
Abstract

Coverage is one of the crucial performance measures for Wireless Multihop Networks (WMN) and is widely explored by researchers. The coverage performance of the network indicates how effectively the deployed network is able to provide the required ...

research-article
PRLAP-IoD: A PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones
Abstract

In recent years, the industry and research have cast great attention to the Internet of Drones (IoD), which is becoming progressively popular since it can bring a great convenience to various application scenarios, such as national map ...

research-article
Mitigating the impact of controller failures on QoS robustness for software-defined wide area networks
Abstract

Emerging cloud services and applications pose different Quality of Service (QoS) requirements for the network, where Software-Defined Wide Area Networks (SD-WANs) play a crucial role in QoS provisioning by introducing network programmability into ...

research-article
MicroCM: A cloud monitoring architecture for microservice invocation
Abstract

In the complex operating environment, it is difficult to find the root of the issue when there are some time-consuming or error performance issues when executing the request. Aiming at resolving the above challenge, this paper designs and ...

research-article
PETNet: Plaintext-aware encrypted traffic detection network for identifying Cobalt Strike HTTPS traffics
Abstract

Cobalt Strike is the most prevalent attack tool abused by cyber-criminals to achieve command and control on victim hosts over HTTPS traffics. It appears in many ransomware attacks and espionage attacks, threatening public privacy and national ...

Highlights

  • A wide and deep learning-based method to detect Cobalt Strike HTTPS traffic.
  • Extracting the identity-agnostic handshake meta features in wide branch.
  • Configuration-aware encoding of interaction between client–server in deep branch.

research-article
Scalable packet classification based on rule categorization and cross-producting
Abstract

Packet classification performs multidimensional point location upon fields in packet headers to categorize packets into multiple forwarding classes based on pre-defined rules. It plays an important role for the data plane of software-defined ...

research-article
PF-IBDA: Provably secure and pairing-free identity-based deniable authentication protocol for MANET environments
Abstract

Mobile Adhoc Network (MANET) is used in various real-time applications, such as e-voting, army tactical communication, health-care applications, disaster rescue, online message exchange, etc. However, source authentication and deniability are ...

research-article
An adaptive classification and updating method for unknown network traffic in open environments
Abstract

In recent years, to address the classification problem of unknown traffic in open network environments, numerous deep learning (DL)-based classification techniques have been proposed. Among these techniques, the single threshold-based DL method ...

research-article
Unlocking QoS Potential: Integrating IoT services and Monte Carlo Control for heterogeneous IoT device management in gateways
Abstract

The exponential surge in IoT devices has presented significant challenges in managing network traffic and maintaining Quality of Service (QoS) in IoT networks. To tackle these challenges, ongoing efforts are focused on developing innovative ...

research-article
A smart contract-based robotic surgery authentication system for healthcare using 6G-Tactile Internet
Abstract

An intelligent robotic surgical system, utilizing the capabilities of 6G-enabled Tactile Internet (TI) and blockchain technology, holds remarkable promise for providing remote healthcare services in real-time. This system has the potential to ...

research-article
Elastically accelerating lookup on virtual SDN flow tables for software-defined cloud gateways
Abstract

In recent years, Software-Defined Networking has been gradually applied to cloud gateways to provide efficient, reliable and flexible data transmission services for various large-scale cloud platforms. However, massive concurrent accessing ...

Comments