no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A channel hopping based defense method against primary user emulation attack in cognitive radio networks
|
Ahmadfard, Arash |
|
|
148 |
C |
p. 1-8 |
article |
2 |
AdaWFPA: Adaptive Online Website Fingerprinting Attack for Tor Anonymous Network: A Stream-wise Paradigm
|
Attarian, Reyhane |
|
|
148 |
C |
p. 74-85 |
article |
3 |
An efficient architecture for the accurate detection and monitoring of an event through the sky
|
Sharma, Amit |
|
|
148 |
C |
p. 115-128 |
article |
4 |
An optimal sensor placement algorithm (O-SPA) for improving tracking precision of human activity in real-world healthcare systems
|
Alarifi, Abdulaziz |
|
|
148 |
C |
p. 9-16 |
article |
5 |
A review of the noise uncertainty impact on energy detection with different OFDM system designs
|
Lorincz, Josip |
|
|
148 |
C |
p. 185-207 |
article |
6 |
CHPC: A complex semantic-based secured approach to heritage preservation and secure IoT-based museum processes
|
Konev, Anatoly |
|
|
148 |
C |
p. 240-249 |
article |
7 |
Constrained pattern extension algorithm based peak power reduction techniques for MIMO-OFDM applications
|
Ramesh, B. |
|
|
148 |
C |
p. 42-47 |
article |
8 |
Cross centric intrusion detection system for secure routing over black hole attacks in MANETs
|
Rajendran, N. |
|
|
148 |
C |
p. 129-135 |
article |
9 |
Dynamic control of functional splits for energy harvesting virtual small cells: A distributed reinforcement learning approach
|
Temesgene, Dagnachew Azene |
|
|
148 |
C |
p. 48-61 |
article |
10 |
Editorial Board
|
|
|
|
148 |
C |
p. ii |
article |
11 |
FWB: Funneling Wider Bandwidth algorithm for high performance data collection in Wireless Sensor Networks
|
Tavares, Rodrigo C. |
|
|
148 |
C |
p. 136-151 |
article |
12 |
Generation of Frequent sensor epochs using efficient Parallel Distributed mining algorithm in large IOT
|
Rani, R.M. |
|
|
148 |
C |
p. 107-114 |
article |
13 |
M2-DaGNoS: A data gathering and node scheduling mechanism for Multimodal Wireless Sensor Networks
|
Aranda, Juan |
|
|
148 |
C |
p. 165-175 |
article |
14 |
openLEON: An end-to-end emulation platform from the edge data center to the mobile user
|
Fiandrino, Claudio |
|
|
148 |
C |
p. 17-26 |
article |
15 |
Opportunistic schedulers and asymptotic price for fairness
|
Kavitha, Veeraruna |
|
|
148 |
C |
p. 27-41 |
article |
16 |
Pulse Position Coded Medium Access in energy-starved networks
|
Feng, Dezhi |
|
|
148 |
C |
p. 62-73 |
article |
17 |
QoS enhancement with deep learning-based interference prediction in mobile IoT
|
Zafar, Saniya |
|
|
148 |
C |
p. 86-97 |
article |
18 |
Removal notice to “Equipping recurrent neural network with CNN-style attention mechanisms for sentiment analysis of network reviews” [Comput. Commun. 148 (2019) 98–106]
|
Usama, Mohd |
|
|
148 |
C |
p. 250 |
article |
19 |
REMOVED: Equipping recurrent neural network with CNN-style attention mechanisms for sentiment analysis of network reviews
|
Usama, Mohd |
|
|
148 |
C |
p. 98 |
article |
20 |
Spectrum Expansion/Contraction and Survivable Routing and Spectrum Assignment problems on EONs with time-varying traffic
|
Din, Der-Rong |
|
|
148 |
C |
p. 152-164 |
article |
21 |
The security of Internet of drones
|
Lv, Zhihan |
|
|
148 |
C |
p. 208-214 |
article |
22 |
Tooth implant prosthesis using ultra low power and low cost crystalline carbon bio-tooth sensor with hybridized data acquisition algorithm
|
Vellappally, Sajith |
|
|
148 |
C |
p. 176-184 |
article |
23 |
VARMAN: Multi-plane security framework for software defined networks
|
Krishnan, Prabhakar |
|
|
148 |
C |
p. 215-239 |
article |