


default search action
Computer Communications, Volume 174
Volume 174, June 2021
- Hui Xie, Zhengyuan Zhang
, Qi Zhang, Shengjun Wei, Changzhen Hu:
HBRSS: Providing high-secure data communication and manipulation in insecure cloud environments. 1-12 - Yevgeni Koucheryavy
, Ekaterina Lisovskaya
, Dmitri Moltchanov
, Roman Kovalchukov
, Andrey Samuylov
:
Quantifying the millimeter wave new radio base stations density for network slicing with prescribed SLAs. 13-27 - Marios Thoma
, Christoforos N. Hadjicostis:
Detection of collaborative misbehaviour in distributed cyber-attacks. 28-41 - Godfrey Kibalya
, Joan Serrat, Juan-Luis Gorricho
, Jonathan Serugunda
, Peiying Zhang:
A multi-stage graph based algorithm for survivable Service Function Chain orchestration with backup resource sharing. 42-60 - Urvashi Garg
, Geeta Sikka, Lalit Kumar Awasthi
:
An ensemble approach for optimization of penetration layout in wide area networks. 61-74
- Jiao Chen, Yongquan Luo, Hongfei Zhang, Weibing Du:
Quality evaluation of lightweight realistic 3D model based on BIM forward design. 75-80
- Md. Rajibul Palas, Md. Rakibul Islam
, Palash Roy
, Md. Abdur Razzaque, Ahmed Alsanad, Salman A. AlQahtani
, Mohammad Mehedi Hassan:
Multi-criteria handover mobility management in 5G cellular network. 81-91
- Lidong Zhang, Mengmeng Zhang, Jian Wang, Xiaowei Li
, Wenxing Zhu:
Internet connected vehicle platoon system modeling and linear stability analysis. 92-100
- Syed Roohullah Jan, Rahim Khan
, Fazlullah Khan
, Mian Ahmad Jan
, Mohammad Dahman Alshehri, Venki Balasubramaniam
, Paramjit S. Sehdev:
Marginal and average weight-enabled data aggregation mechanism for the resource-constrained networks. 101-108 - Wassila Lalouani
, Mohamed F. Younis
, Uthman Baroudi
:
Countering radiometric signature exploitation using adversarial machine learning based protocol switching. 109-121
- Kuo Cheng Chung
, Chun-Hung Chen
, Hsueh-Hsuan Tsai, Ya-Hsueh Chuang
:
Social media privacy management strategies: A SEM analysis of user privacy behaviors. 122-130
- Barnana Baruah, Subhasish Dhal
:
A secure road condition monitoring scheme in cloud based VANET. 131-142
- D. Anitha
, R. A. Karthika
:
DEQLFER - A Deep Extreme Q-Learning Firefly Energy Efficient and high performance routing protocol for underwater communication. 143-153 - Gildásio Antonio de Oliveira Júnior
, Rafael Timóteo de Sousa Jr.
, Robson de Oliveira Albuquerque
, Luis Javier García-Villalba
:
Adversarial attacks on a lexical sentiment analysis classifier. 154-171
- Chang Yun Park
:
Developing an asynchronous NoAck-based full-duplex MAC for IEEE 802.11 networks in a systems approach. 172-189
- Nan Hai
, Daqing Gong, Shifeng Liu:
Ontology knowledge base combined with Bayesian networks for integrated corridor risk warning. 190-204 - Limin Wang, Honghuan Wang, Xuming Han
, Wei Zhou:
A novel adaptive density-based spatial clustering of application with noise based on bird swarm optimization algorithm. 205-214

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.