Personal Information
Occupation
Network Protocols & Wireless Networks
Industry
Technology / Software / Internet
Website
About
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas
Tags
wireless sensor networks
routing
internet of things
networks wireless network
security
wireless sensor network
cloud computing
network protocols
clustering
network security
network
computer network
machine learning
manet
wireless networks
wsn
iot
qos
routing protocols
routing protocol
aodv
load balancing
network architectures
quality of service
high speed networks
fuzzy logic
networking
deep learning
intrusion detection
5g
energy efficiency
networks
anomaly detection
vanet
intrusion detection system
blockchain
ofdm
computer networks
neural network
sdn
wireless network
lte
social network
protocols
switching and addressing techniques
authentication
congestion
computer networks & communications
reinforcement learning
privacy
olsr
network lifetime
localization
ubiquitous networks
tcp
congestion control
cyber security
ids
performance analysis
6g
ipv6
routing algorithm
feature selection
cognitive radio
quality of service (qos)
mimo
artificial intelligence
particle swarm optimization
channel estimation
wireless
mac
residual energy
packet scheduling
wireless lan
leach
rpl
underwater wireless sensor networks
cybersecurity
optimization
long term evolution (lte)
network management
resource allocation
handover
ad hoc network
mobile networks
smart home
wireless communications
wlan
analytic hierarchy process
network protocols & wireless networks
clustering algorithm
wi-fi
wireless sensor networks (wsns)
multimedia
adhoc and sensor networks
optical networking
communications
machine learning algorithms
social networking
delay
voip
spectrum sensing
aes
dsr
deep reinforcement learning
bit error rate (ber)
cryptography
steganography
network coding
algorithm
performance evaluation
cluster head
social networks
mobile ad hoc networks
fog computing
apt
multi-criteria
security effectiveness
multipath
vulnerability
web applications
virus
mobile network
trust
cognitive radio network
goal question metrics
wireless mesh network
network marketing
nfv
otfs
ipv4
iot security
reliability
block cipher
energy consumption
vanets
mobile ad hoc network
ensemble learning
wimax
machine learning.
temperature
bittorrent
internet
energy efficient
performance evaluation.
energy-efficient
communication
data fusion algorithms
openflow
response time
satellites
topology control
encryption and decryption
dsrc
security.
vehicle-to-everything
zigbee
elliptic curve cryptography
deep packet inspection
mano
graph theory
manets
actor critic
dsdv
medium access control
opportunistic routing
lstm
streaming
distributed algorithms
topology
access control
graph
ibk
naivebayes
multilayer perceptron
gainratio
chi-square
peer-to-peer
traffic congestion
nbtree
correlation feature selection
network monitoring
web application
cellular mobile networks
anomaly detection.
cognitive radio networks
network anomaly detection
internet of things (iot)
energy
cisco access points
mimo systems
optimal packet length
logistic map
mutual authentication
contextual information
authentication framework
iots
supervised learning
usability
cdma
beyond 5g
healthcare
adjustable range load balancing protocol (albp).
edca
ultra-low latency
network architecture
urban area
genetic algorithm.
information security
multiple-input multiple-output
mobility
data mining
next generation internet
cross layer
wireless sensor network (wsn)
humidity monitori
adhoc
clock synchronization
cellular network
ber
multipath fading
millimeter-wave (mmwave)
rule table
(wsn)
random waypoint model.
papr
distributed lifetime coverage optimization protoco
adjustable range deterministic energy efficient pr
multi-criteria decision making
sniff
peer selection
adaptive sensor sensing range (assr)
content distribution
hesitant fuzzy linguistic term
mimo-ofdm
raspberry pi
synchronization
benchmark
q-learning
mosquitto
ad-hoc
des
blowfish
mqtt
authenticated key agreement
game theory
mobile cloud computing
neural network.
evolutionary computing
healthcare service
unsw-nb15
big data
sensor network
monitoring.
gradient boost classifier.
whale optimization
fpa
custom features
unsw-b15
error minimization.
hybrid beamforming (hbf)
agriculture
massive multi-inputmulti-output (mmimo)
virtual neighbour table
secure navigation
tree-based
data aggregation.
dynamic task scheduling
waiting time
round robin algorithm.
omega network
cut-through
semi-layer multistage networks
explainable ai (xai)
uniform traffic
shapley additive explanation
autoencoder
non-orthogonal multiple access.
hotspot traffic
banyan networks.
communication system security
global mobility network
health information management
p2p reputation management
homomorphic cryptosystem
eigentrust
paillier cryptosystem.
key distribution
border gateway protocol (bgp)
extreme learning machine (elm)
cooperative localization
bit error rate
deterministic energy efficient protocol (deep)
cellular networks
otdoa
sound localization & wireless positioning.
cluster heads (chs)
clustering approach
firewall
energy efficient (ee)
store-carry-forward
leach.
layer depth
retrial
fgc
direct communication
worms & trojan.
scheduling
information-centric networking (icn)
named-data networking (ndn)
v2x communication
in-network caching
improved throttle algorithm.
processing time
queuing delay.
cache replacement.
hello process
link change rate
hello interval
energy-saving application
neighbour table
v2x communication.
orchestration
real time traffic
wsn.
sensor networks
jamming attack
virtualization
fuzzy logic control flc
power control
quality of experience
traffic engineering
genetic algorithm
qoe
markov reward models
attack graph
dynamic diffusion
hilbert transformation
burning ship fractal
infogain
positioning
wifi
node degree
aomdv
utilization resource prediction.
visible light communication
multiple web access
wireless communication
home automation
pan
wormhole routing
channel assignment
unmanned aerial vehicles (uav)
heterogeneous wireless network
ddos attack
ieee 802.11
smart mobile devices
energy conserving
ibleach algorithm
leach algorithm
par
markov chain
intent-based networking & realtime visualization
voice-assistance
rayleigh fading channels.
virtual machine.
adaboosted ensemble learning
integer programming
iot edge security
machine learning for iot
unsupervised learning
ddos
service level agreement
anti-jamming technique
efficiency
non-homogeneous markov model
radar sensing
internet and web applications
dynamic selection
next generation web architectures
network operations & management
timestamp
mobile ad-hoc network (manet)
6g potential applications
wsns
bs
alamouti
multi user
cw
flow label
leo
co-channel interference
filter bank
live streaming
cloud security
dwt
prediction
infrastructure and platforms design tool for cloud
cloud application
parameter optimization.
mobility speed
deepmimo
mmwave
coordinated beamforming
multimedia etc big data tools and systems big data
bioinformatics
self-pruning
throughput
routing in iot. packets aggregation mechanism.
high-performance iot
bloom filters
context-aware addressing
continuous-time markov chain
pdr.
csma
eec
hwsn
lorawan
swarm intelligence
relay node placement
iptv
diffserv
urllc
random access
signal propagation
hybrid access scheme
field-programmable gate array (fpga).
hybrid model
switchable data dependent operation (sddo)
controlled substitutionpermutation network (cspn)
interference-to-interference-plus-noiseratio
signal-to-interference-plus-noise-ratio
long time evolutionadvanced
heterogeneous network
user equipment
handover decision
carrier aggregation
sensor node
lifetime
heterogeneous networks
privacy and trust big data applications
models and algorithms big data infrastructure and
big data techniques
performance prediction
scalability
cellular
ad hoc
reputation
ad hoc networks
mobility models
multi-path routing
psnr.
simulations
cluster
real-world networks
routing attack
packet loss
phishing
multiuser precoder
simulation
data accumulation
torus
frame size optimization
heterogeneous traffic
throughput optimization
spider swarm optimization
data shifting
sip
ray tracing
throughput (tp)
security awareness
interest selection
optimal network path
vehicular named data networks
codec
network topology
cellular mobile network
high mobility
botnet
pruning
radar isac
millimeter-wave mimo systems
filter bank multicarrier
fbmc
internet mobile gateway select
adjacent channel
vehicular relay selection & ro
range-free methods
complexity
virtual routing function
dynamic authentication
anchor node
entropy measu
fingerprint recognition
network bandwidth
security culture
available bandwidth estimation
data aggregation
tailored treatment
internet marketing
computing
downlink mu-mimo
mse
biometric
adversary
attack detection
phishing attack
monitoring
worms &trojon
rendezvous sequence
stepwise conditional parameter
rest
asset tracking
privacy preservation
iris recognition
neighbour attack
ns-3
internet of medical things
data privacy
spectrum efficiencies
post-disaster scenario
networks & communications
system capacity
android
single-board computers
fixed-grid network
mean square error
tapped-delay line
node residual energy
application shimming
random oversampling
enhanced efficiency
p2p botnet
cluster feature vector
information technology
smart transportation system
vulnerabilities
gps
multifactor authentication (mfa)
blockchain security
communication graph
arnold map
hash chain
forward secrecy
dct
deep deterministic policy grad
path planning
ant colony optimization
web attack
pseudonym change
vehicular networks
information diffusion
route discovery
algorithms
levy flight
olsr routing
resource-constrained network
crossover
mobile ad hoc
support vector machine
quality of experience metrics
multi-objective golden eagle o
software-defined networking (s
multipath routing
non orthogonal multiple access
massive connectivity
quality of service metrics
fog-cloud
video streaming
smart grid
node localization
grpc
5g and beyond
radio frequency attenuator
broadband powerline (bb-pl)
interleave division multiple a
interleavers
attack
maximal ratio combining (mrc)
ransomware
underwater wireless sensor net
optical link
android malware detection
two-dimensional
hybrid code
machin learning
mpr
radio resource management
multiagent q-learning
matlab
wban
interactivity
imbalance data
digital signature authenticati
collective signature
ieee 802.11p
e-content
spectrum sharing
antennas
clusterhead
compressive theory
measurement
millimeter wave
link quality
neighbor density
vehicle velocity
lsb technique
edge detector
co-channel
arithmetic coding
correction method
visual cryptography
share generation
key exchange
image compression
route establishment
iomt
quantization
group signature
mobile ip
software defined network
malware detection
vehicular ad-hoc network
http
content-centric networking
data gathering
distributed
privacy protection
approximation
rdm
hexagonal
peafowl mating
software defined networking (sdn)
data security
awgn
requirements
resource management
cognitive networks
bluetooth low energy
industrial internet
connected dominating set
femto-cells
lte-advanced (lte-a)
hamiltonian model
deadlockfree
broadcasting communication
3-d mesh topology
split-protocol
attack trees
and reliability.
non-state-space model
mincuts
multipath fading.
zone prediction
wavelets
tracking
dynamic position
network address translation
triangulation
database management.
forensic system architecture
forensic analysis system
network forensics
computer networks; minimum-cost paths tree; geneti
spectral radius
random network
small-world network
eigenvalue
scale-free network
logarithmic rule (log-rule)
carrier aggregation (ca)
heterogeneous networks (hetnets)
intra-band contiguous
modified largest weighted delay first (mlwdf)
lte-sim-5.
health & ansprolog
exponential rule (exp-rule)
virtual backbone
adaptive modulation and coding
petal routing
cross-layer design
cooperative relay diversity
adaptive retransmission
prior storing server
internet protocol television.
video contents
passive optical network
teks
white space steganography
lzw
huffman coding
policy-based network management
compression
adhoc using cisco devices.
dacs scheme
self-configuration
network stack composition
link cost
and software fault injection & composed web servic
fault tolerance methodologies
compuetr networks
security breaking cost
mobile payment
and encryption.
auction cluster head
encapsulation
multi-bs
cloud sensor
multi-hop
distributed coordination
alternative cluster head nodes
spectrum heterogeneity
slave
dual-slave
logic programming
control channel dilemma
broader gateway protocol (bgp)
coordinator
sara
ant based routing
security kernels
ftlr scheme
lognormal shadowing model
model unit disk graph model
directories
lr-aided
complex and virtual devices
representational state transfer
notch antenna
topology change
substrate
triangular microstrip antenna
broadband antenna
slotted antenna
wireless application
radio propagation models
evolutionary system
network simulation
labview
remote healthcare
mobile device
patient monitoring
3-d mesh
authenticated data structure (ads)
web services
network on chip
noc
self-optimization
complexity.
lattice
tcp computation enhancement
qos for routing
lll
wireless ad-hoc networks
smart routing.
artificial fish swarm algorithm
node clustering
peer-to-peer streaming
link prediction
dpcplp
signal strength
embedding
hex-cell network
expansion
dilation
hysteresis
call admission control
statistical methods & packet length.
mobile relay node
wireless sensors network (wsn)
manet.
dynamic clustering
energy balancing
media independent handover (mih)
vertical handover (vho)
optimal cluster size
video on demand
interactivity.
selfish nodes
grp
key management.
active attack
passive attack
hello flood attack
free space optical communications
web browsing & mobile networks
wifi cellular interworking
network failure tolerance.
onf
openflow and openstack
heterogeneous wireless networks
vnf
optimisation
rate control.
mass balancing theorem
chemical networking protocols
flow networks
different service quality
improve accuracy
total processing time.
multiple access points
joint multiple resource allocation
transmission power
packet reception ratio (prr)
distributed optimisation
potential game
decision making system
global positioning system
mobile cloud offloading
andsf (access network discovery and selection func
hybrid
ccdf
smart cities
cooperative spectrum sensing
pts
cost estimation
city services
cloud architectures
energy efficient sensing
radio propagation
unified qos metric
dynamic weight
application weight
weight
qos metric
as-friendliness
p2p live streaming
peer selection algorithm
received signal strength indicator (rssi)
wireless sensor network (wsn).
levenberg-marquardt (lm) algorithm
bandwidth allocation
user satisfaction
zigbee & rfid.
atmospheric attenuation
reliable hetnet
modeling
packet-switching networks
visibility
optisystem 7.0
dynamic bandwidth distribution.
link distance
peer-to-peer (p2p)
overlay multicast tree
transmission range
wireless ad hoc networks
connectivity.
mih (media independent handover)
ansf (access network selection function)
vho (vertical handover)
ims (ip multimedia subsystem)
rats (radio access technologies).
information-centric networking
residential energy management
pso
hpc clusters
lsb
ssh tunnelling
nfs
mp3 data set
hybrid protocols.
hiding a message
wireless sensor networks.
integrated system
nms
characterization
cba
nodes
efficiency criterion
cost analysis
virtual mmachines
cloud computing.
lload balancing parameters
visible light communications
information dissemination
delay rate
indoor communication
lightfidelity
digital video broadcasting
deadlock-free algorithm.
broadcast communication
frequency selective
ns2.
peer-to-peer; live streaming; internet service pro
power consumption
energy saving
distribution
ricean
rayleigh
owdm
gis
hsi color space
correlation
gis layers
l*a*b color space
assortativity index
network graphs
clustering coefficient
classification
maximal clique size
compressed sampling
middleware & platform
multi-homed
sdl (specification and description language)
congestion controls
mptcp
sto
frft
cazac sequences
mmse
safety and liveness property.
validation
node monitoring protocol(nmp)
multicast
guarantee qos
ls
snr
reduction of power consumption
accuracy factors
vngn
vrf
vlan
home network
small-world networks
immunization
wi-fi.
opportunistic relay selection
cooperative communications
adaptive m-qam/mpsk modulation
fuzzy basis function fbf
software as a service
infrastructure as a service
orthogonal least squares ols.
distributed computing
and cloud compliance.
peer-to-peer networks
distributed algorithms.
management
performance bounds
multimedia streaming
wireless multimedia sensor networks.
federation
access control.
identity management
federated clouds
orthogonal frequency division multiplexing.
binary exponential backoff.
g-rdm
mam
resource provisioning
autonomic management
alloctc-sharing.
bandwidth allocation models (bam)
ozo generator
phone system
highly available
ip
telecommunications
fast handover.
hierarchical mobile ip
mipv4
mipv6
bloom filter; zfilter; zformation; diffie-hellman-
multimedia sensor networks
video transmission
distributed coordination function
odp polynomial
wlan network
802.11b
fairness
cost-minimizing algorithm
kdd cup 99
cluster 3.0
visualization
k-means
treeview
ims
mobility management
qos management
iqmsmp
profile of qosr
ngn
reac
passive measurements
admission control
cognitive network
hybrid-based methods.
range-based methods
node coding
encoding strategy
narrowband rf networks
node- dependent
network computing
parallel crc computation
cloud service broker
low complex sphere decoder.
outage probability
golden code
spectral efficiency
breadth-first search tree.
approximation algorithms
greedy algorithms
graph matching
vertex cover
simulations; mpls; traffic engineering; fast rerou
event handling
in-network aggregation
attacker
signature
virtual backbone tree
hierarchical clustering.
wormhole attack
number portability
query on release
call dropback
onward routing.
all call query
video recording
accident.
performance & 802.11p
cloud computing; cloud services; quality-of-servic
gsm
mobile service
short message service
sms
qos routing. 1. introduction
hierarchical routing
naming mechanism; name-specifiers; predicate-based
rank revealing
qr factorization
null (noise) space
frequency estimation
time delay
signal space
music
subspace estimation method
lu factorization
cross-layer scheduling
root-music.
matrix decomposition
packet delay
cooperative stbc
cooperative communication
fft
isi
dynamic rekeying
multimedia broadcast multicast services
lkh
gsa
smo
vowlan
codec adaptation.
voip capacity
cross-layering
ide-integrated development environment
gui-graphical user interface
adt-android development tool.
hids
nids
honeypots
steganogaraphic noise
difference in histograms
random pixel selection
adaptive colour image steganography
histograms of colour image
psnr
tora
secure clustering
dynamic clustering and data aggregation
addressing types
ipv6 header and exhibition date.
remaining energy
cyber threats.
social networking websites
coverage loss time
wdm
wavelength and converter assignment problem
wavelength conversion
rout discovery
transmission opportunity
queuing delay
best effort
chebyschev
dvb-t
ifft
orthogonal
butterworth
elliptic
psd.
dvb
multi-carrier
node lifetime
cyber attacks
internet vulnerabilities and medical identity thef
security component
interoperability cheking
relevancy
misconfigurations detection
formal verification
firewall.
projection
formal correction
eigenvalue spectrum
routing path.
reciprocity.
radio resource management (rrm)
proposed economic model
ufas
maximum network welfare.
stream cipher
encryption oracle
mode of operation
quantum communication
phase shift keying
eventual consistancy
xbee
qos routing
maximum stability
minimum distance spanning tree
dtmc markov model
sirs epidemic model
epidemic disease
dtmc markov model
sirs epidemic model
epidemic disease
e-protection
multi-media. 1. introduction
security of e-content
e-protection
multi-media. 1. introduction
security of e-content
mobile sensor networks
linux.
cloud service provider and cloud security.
integrity
resources
data stores
identity theft
programming models
heuristic algorithm
intelligent transportation system
waveins
distributed manet management
6to4 tunnel
manual tunnel
piece selection
performance.
peak to average power ratio (papr)
orthogonal frequency division multiplexing (ofdm)
cumulative complementary distribution function (cc
high performance computing
heterogeneous environments
parallel computing
sir model; seirs model; delay differential equatio
lte; mimo ;ofdm
dynamic spectrum access
bluetooth network
jammer technology
hierarchical hybrid edf/fifo
non real time traffic
vanet; mobility model; simulations
round trip time (rtt)
planning
passive optical network (pon)
dynamic bandwidth allocation (dba)
deauthentification
packet injection
tools
smart phone forensic
digital forensic
internal memory
digital evidence
analysis
wavelet- eigen vector
de-noising
wavelet
peak-to-average power ratio
dual band
eigen vectors component.
m/d/1 with vacations
dcs and wlan
mean waiting time
m/h2/1
voice control
energy management
z-wave
industrial automation
assistive homes
insteon
intrusions
lognormal sum
moment matching
log skew normal
amplitude clipping and filtering (acf)
elliptic filtering (ef)
iir (infinite impulse response
amplitude clipping and filtering (acf)
iir (infinite impulse response
elliptic filtering (ef)
interconnection topology
hex-cell topology
hex-cell topology
interconnection topology
dna
nist
mixcolumns
mds
power management
bottleneck energy
mobile applications
uwsn
fuzzy c-means
step-size.
grid point approximation algorithm
degree of freedom "dof"
matlab simulink
802.15.4
rdp
remote desktop environments
users perceived operability
tesbed
fleetnet
its
queuing theory
tcp v ariants
mobility .
real time
priority of traffic flow
history routing data
bandwidth - guaranteed routing alg orithm
broadcast trees
web service
non-deterministic delays
non-deterministic delays
sensor
applications
multi carrier
multi carrier
multiplexing techniques
digital modulation formats
ieee 802.16d
sui- 4
16-qam
64-qam
sui-6.
qpsk
bpsk
sui-1
sui-2
sui-3
sui-5
mobile ad hoc network (manet)
collision avoidance.
energy detection .
bam
management dynamic
alloctc
modelling
system & network vir tualization
hypervisor
complementary cumulative dist ribution function (c
orthogonal frequency division multiplexing ( ofdm)
smart vehicle
grx (gprs roaming exchange)
ipx (ip exchange)
roaming
white label
interconnection
peering
hosted
connected candidate order
long- reach passive optical networks; dynamic band
real time traffic.
mesh-pull backup
token based coordination
multicast trees
resiliency technique
scalable codec
node disjoint routing
qos routing; mobile ad hoc networks; energy-aware
double stack
tcp and rtt
bgpv4
ospfv3
isp
qam & wdm.
inf ogain
socioeconomic indicator s
imaginary value
phase sensitive detector method
re al value
bioimpedance
tetrapolar
interasterisk excha nge protocol (iax)
real time switching control criteria (rsw).
interworking
topology construction
topology maintenance.
enr
node classification.
erasure code
pfr
optimized edge routing
performance routing
network life
heterogeneous
pops virtual mobile ip network.
internet service provider
point of presence
mobile ip border gateway
intrusion prevention
inline measurement tcp (imtcp)
available bandwidth
bandwidth measurement
mobile agents
sn mp
energy co nsumption
tdma
ns 2.
link aware.
application level multicast
multicast tree
overla y networks
multi-hop relay stations
fairness and throughput
mobile stations
sched uling
middleware
mo bile device
mobile social network
wide area network
traffic density
shortest path algorithm
dra
traffic matrix
maximizing network interruption problem
graph signal processing
software defined networks
truncated mean
clock time duration.
mfo
stable & vanet.
context-aware architecture
probabilistic voting-based filtering
false positive attack
false negative attack
network security.
extended clas
elliptic curve encryption.
sumo.
data accuracy.
sumo
data accuracy
qos.
threshold based vm placement technique for load ba
virtual machine
aodv routing protocol
aodv routing protocol.
privacy.
security and privacy for iot iot-enabled innovatio
delay sensitive.
queuing dela
delay sensitive
packet capture
qlrp
qltpc.
iov
deep convolutional neural learning
protection motivation theory
fear motivation
digital native
digital immigrant
information privacy
antivirus.
machine authentication
cryptography.
knuth shuffle method
image encryption
parallel processing
digital communication
pulse position modulation.
big data security
microstrip patch antenna
design optimization
ultra-wideband.
hpv vaccination
gini index
income inequality
rstudio
american adolescents
multiscale analysis
multilayer representation
qos metrics
orthogonal frequency division
peak to average power ratio
selective mapping
filtering and clipping
aodvmo
one-time passwor
eagle optimization
euclidean distance
electronics
information technologies
successive interference cancel
mmtc
ijcnc
computernetwork
岳辿鉛辿界看馨馨顎稼庄界温岳庄看稼壊
bandwidth
radiation efficiency
microstrip patch antenna (mpa)
decentralized clusting
relay node.
light regions
comp
physical unc
cw.
signal to noise ratio (snr)
b
standa
packet capture.
raspberry
cognitive radio resource
dos attack
rf energy transfer
multiplicative interleaving wi
sac-ocdma systems
nzcc code
md code
spectral/spatial dimension (sd
humidity monitoring systems
energy reservation
environmental monitoring
signing group
multiplicative interleaving
tree algorithm (mita)
network protocols & wireless n
machine learning attack
xor-puf
one-time password
security routing protocol
quality-of-service (qos).
successive interference
wireless sensor networks (wsn)
sensor nodes (sns)
anchor nodes (ans)
rof-based radio access network
real-time monitoring
minimum number of drones
intelligent transportation system (its)
roadside unit (rsu)
urban topology
ns-2
vanetmobisim
quality of service (qos).
internet of things.
data collection
jamming detection
vehicular communications
level crossing rate
mobile communication
tetra (terrestrial trunked radio).
phishing detection
url
visual similarity
convolution neural network.
obs
quality of services (qos)
share-per- link (spl)
fiber delay lines (fdl)
retrial queueing.
m/bp/1system
average waiting latency
mean queueing delay.
d2d
olsr& coverage.
virtual wan accelerator
content delivery services
minimum network cost
black-hole attack
discrete trust
consensus trust
and contextual information.
6lowpan
local repair
6rlr-abc
lr-abc mechanism
multi-channel multi-radio
gravitational search algorithm.
hotspot issue
unequal clustering
multihop communication
adaptive threshold
flooding attack
software-defined networking
uav communication
private uav network
lans of drones
signaling frames
control and feedback singling
ranging methods
range-based &range-free.
lods
uav networks
random forest
k-nearest neighbors
naive bayes.
algorithms and applications bioinformatics compute
transmit power.
transmit power
biogeography based optimization
optimal route
vehicular ad hoc network
visible light communication.
ims & mipv6
greedy algorithm
mmpp
ims & mipv6.
greedy algorithm.
mmpp.
traffic shaping
nfv.
broadcasting
flooding
neighbour coverage
forwarding probability
connectivity metric.
unmanned aerial vehicles
internet of everything
channel modelling
propagation model
fifth generation.
private blockchain networks
linear predictors
computer networks & communications cyber trust and
software systems and technologies
passive measurement
active measurement
fuzzy logic.
cloud business
cloud game
positional tracking
rendering of 3d game view.
link break
routing protocol.
android smart phone
internet of things (iots)
remote control.
vehicular ad-hoc network (vanet)
structured p2p systems
distributed hash table (dht)
locality awareness
replication.
cooperative systems
rayleigh fading channels
case studies
failure probability
sensor lifetime
subsets
classification model
topology maintenance
message control
dataset
architectural
cloud
web architectures
isolation forest
local outlier factor
smart designated node
intrusion detection systems
dimensionality reduction
multi-server security
cryptanalysis
fuzzy commitment
sdwn
nonlinear programming
macstrategy
high performance
architectures
wireless multimedia
mac strategy
traffic index
traffic sensing systems
ifog-simulator
mish
cnn-bigru
hogzilla dataset
sha-1
content forwarding
network performance
spatio-constraints
cross-layer
cognitive radio network (crn)
intelligent systems
software process
web engineering
l software engineering
software maintenance
knowledge-based systems
formal methods
testing
windows
shimming
radio network
spatioconstraints
mayfly optimization
delay efficiency
nsl-kdd dataset
kyoto dataset
two stage detection
energy detection
mean detection time
architectural styles
orchestration and rest
resource utilization
multipoint relay
reactive
rwp
reinforcement learning-based r
automatic
cognitiveradio
deeplearning
mask r-cnn
instancesegmentation
direct-to-satellites
inertial navigation systems
ins errors
convolutional neural networks
packet drop
end-to-end delay
best-effort network topology
eniao
fish school search routing
duty cycling
wsn optimization
adaptive hybrid deep learning
mprs selection
links fineness
spatial relation
ns3 simulator
navigation systems
neural networks
innovation
wireless internet'
message digest
data integrity
digital signature
national security agency
cluster-based routing protocol
low-power and lossy networks
position information response
position information request p
pdr
eecrpsid
non-interactive zero-knowledge
radio networks
mobile marketing
radar
software development
software
software testing
per
differential privacy
collaborative learning
federated learning
threat
mcdm
mitre
nantar algorithm
machine learning techniques
cse-cic-ids 2018
litnet-2020
security in remote work
cyberattack detection system
clustering techniques
3-dimension
techniques
high-traffic networks
posterior belief
3-dimension markov chain
quasi birth-death (qbd)
retrial queueing
ad-hoc network
unlicensed band
ranging localization methods
broadcast latency problems
reachability
average latency etc
vanet-lte integration
t
mobile adhoc network
broadcast latency problems;
dynamic
security training
security management
graph-mining
secure routing
kvm
benchmarks
kernel-based virtual machines
dft spreading
single carrier effect
generalized dft
papr reduction
physical unclonable function
red deer algorithm
standard-deviation based encod
variable encoding
dynamic spectrum allocation (d
single carrier-frequency divis
ws-olsr
mpr selection
wingsuit flying search
broadcast storm problem
tomek links
imbalanced data
distributed denial of service
feature extraction
tuning parameters
web usage
usage mining
http csic dataset
networked systems
tomek link
5g and networks for big data
database and system security
security & ai integration
security & network management
low energy
wireless sensor
rateless
advertisement
congestion detection
rateless and wireless sensor
mobile wsn-iot
k-means clustering
ch selection
weight function
fnd
intelligent transportation sys
salp swarm algorithm
multi objective optimization
stable election protocol
contact tracing
covid-19
confidence interval
lightweight environment
smart contract security
os pen testing
exploit windows
persistence attack
mininet wi-fi
association control
access point selection
software-defined wireless net
content dissemination
technology
radio technology
secure system
wearable wireless sensor
fifth-generation radio technol
long-te
wearable wireless sensor secur
ul-a
anti-phishing
non-content bas
network securit
blockchain technology
vanet security
internet of thing
url phishing
ddos attacks
statistical analysis method
dynamic entropy
newcwv
bursty tcp traffic
improved reptile search algori
nature inspired computational
convergence rate
cicids-2018 dataset
system calls
ecc
data
bluetooth
stable election protocol(sep)
sepinsensitive fuzzy c-means.
sensitive persons
electromagnetic radiation (emr)
emr exposure level
signalling protocol
network auto-configuration.
cloud robotics
openstack
apache
ros.
transmission energy
simulation analysis.
network attack
dark-net monitoring
topology map
adjacency matrix
laplacian matrix
total accessibility matrix
mobile adhoc networks (manets)
dynamic source routing (dsr)
preemptive routing
synchronization process
packet communications
asynchronous data stream
discrete information
channels with a random multiple access
program modeling
fat-tailedness
kurtosis
centrality metrics
degree distribution
concordance
opportunistic fair scheduling (ofs)
zero-forcing beamforming (zfb)
channel capacity
lte downlink
spate time block coding and throughput.
adaptive routing
disjoint paths
3d grid
data-oriented privacy
secure data aggregation
spread spectrum.
uwsns
location-based
grid
cell-head election& void-handling algorithm.
knowledge science
flow of knowledge
velocity of knowledge
social sciences.
traffic model
processor sharing
network measurements
insensitive fuzzy c-means
fuzzy logic system.
autonomous underwater vehicle
mission planning
heterogeneous group routing
evolutionary algorithm
encryption
mpi
supercomputer
attributed hierarchical graphs
big graphs
information visualization
visualization systems
secret sharing
lightweight cryptography
public key cryptography
fuzzy classifier
differential evolution
binary harmonic search
akaike information criterion
distributed leader election
internet gateway discovery
server
lan security
lanenforcer
ips
security hardware
multi-core processor
configuration model
control flow
petri nets
composition operations
multi-commodity multi-cost flow
linear-programming
divide and conquer (d&c)
divide and conquer quad tree based multi hop stati
energy efficient routing protocol (eerp)
energy efficient wsns (eewsns).
response surface methodology
and modeling
mobile ad-hoc networks
design of experiments
minimum total network cost
fuzzy system
firefly algorithm
ieee 802.11af
ieee 802.11e
white-fi.
path splitting
virtual optical network
virtual network embedding
elastic optical network
cloud applications
software-defined network
traffic flows
virtual data center
artificial bee colony (abc)
explicit loss and handoff notification
confidentiality
integration
nsl-kdd
kernel
一糸糸99
kernel selection
soc
csp
coap
m2m
sla
oma
preemption
interconnection networks
network services
octagon-cell
interconnected networks
received power
code
electromagnetic radiation
power density
equipment spectrum analyzer.
global system for mobile communications (gsm)
radiation pattern
pgb
agf
fading channel
service level agreement (sla)
adaptive service agreement
autism
self-organizing map
attention shift
distributed file system
data center
tcp incast
network simulator 2.
hlts
spin
dd
qualnet
wireless broadband
minimum total network cost.
interference control
mode selection
device-to-device
matlab.
life-time
mobility load balancing
lte networks
chaotic codes
lyapunov exponent
linear receivers
handoff
cellular wireless network
high bit error
avalanche effect
advanced encryption standard
client/server
mobile agent .
contact center
communication channel
p2p communication
webrct
802.11ad
deep neural networks
joint multiple resourceallocation
cloud computing environments
position accuracy
error rate
carrier interference
average carrier power
detection
priority-based data reporting
ieee 802.15.4 sensor networks
queue management
transport protocol
wsn testbed
congestion control.
home monitoring
has.
adhoc wireless networks
adhoc routing
event condition action (eca)
dirty paper coding
viterbi algorithm.
lattice encoding and decoding
indoor positioning
localisation
smart homes
internet of things & rfid
audio and video transmission
adaptive bitrate streaming
progressive download
global positioning system gps
forgetting factor (了)
ota carrier
interference
recursive least squares (rls) algorithm
energy-aware
ad-hoc networks
power consumption.
is-is
ospf
route redistribution
igrp
eigrp
multicommodity flow
ciphertext
sac
s-box
secure algorithm
af cooperative
convolutional coding
path loss
power allocation
fading.
aifsn
packet delivery factor
queuing and scheduling.
index terms : cooperative systems
network protocols & wireless networks
node-trustworthiness
evolutionary computing based
traffic priority
structure
sniffing
geo encryption
attribute-based
dscp marking
jitter
hfc network
mos.
binary patterns
fingerprint biometrics
histogram
neighborhood tripartite authentication.
weighted extreme learning machine
accuracy
unb iscx2012.
packet delivery ratio
threshold energy
heterogeneous infrastructure as a service
open jackson network
channel model
transfer function
noise modelling
bit error ratio
orthogonal frequency-division multiplexing.
mobile computing clouds
cloudlet network
mobile user
route model
connection channel
metropolitan area network
epc
network applications.
residual energ
intra wireless body sensor network (intra-wb
inter-meeting time
new network communication research articles
standalone communication systems
disaster communication systems
context-aware routing
inter-meeting time.
emergency applications
data delivery
real-time packet
cluster formation
channel switching
delay minimization
network lifetime.
terrestial
aerial platforms
qos performance
temporary events
modbus
programmable logic controllers
network evaluation
benchmark.
mobile ipv6
fhmipv6
nemo
diffserv.
mcs
opportunistic networks
smart city
virtual machine migration
vertical compression
horizontal compression
data reliability
path selection
confidence
priority
fuzzy optimization.
virtual cache
mobile computing
computational offloading
dynamic task offloading
energy optimization.
eehmac protocol and clustering in wsn
protocol
signcryption
elliptic curve
sd-wan
edge computing
kubernetes
containers
services
switching
addressing techniques
computer networks important dates
wireless multimedia systems
availability
opportunistic
communication protocol design
adhoc on demanddistance vector alternative (odva)
open linkstaterouting (olsr)
internet ofthing(iot)
random early detection
active queue management
online password attack detection
protocol analysis
dbscan clustering algorithm
network performances
mobile ad-hoc networks (manet)
self-organized networks (son)
ring
mcr
static routing algorithm
dynamic fault-tolerant routing.
lighting control
dimming
acoustic
underwater wireless device networks
void region
and normalized depth.
lightweight encryption
security analysis
simeck
bandwidth optimization
energy consumption (ec)
efficient reliability and interval discrepant rout
average delay (ad)
execution time (et)
and bandwidth utilization (bu).
communication networks
data center network
flow scheduling
network partition
stochastic scheduling model
software defined networking
multiple displays
pervasive display
content
user engagement.
multiple input multiple output(mimo)
orthogonal frequency division multiplexing(ofdm)
peak to average power ratio(papr). space time bloc
homomorphic encryption
elliptic curve cryptography (ecc)
elliptic curve digital signature algorithm (ecdsa)
honest-but-curious attack
malicious attac
pmipv6
aaa
fast handov
processing time.
housekeeper
robot
human
mobile
tasks.
data security and privacy for cps
wireless sensor network security and privacy
multimedia traffic
routing.
single path
random channel
deterministic channels
resource allocations and interference cancellation
weighted connectivity index
vehicular cloud computing
mobile edge computing
vehicular ad-hoc networks
computation offloading
vod
proxy-cache
all-cache
por-cache
random-cache
dsc-cache
sb
鉛韓s
lps
rfid
anomaly
energy aware routing protocol
ad-hoc multipath
particle swarm optimization algorithm
bayesian network
congestion propagation
soffttwarre deffiined nettworrkiing
qualliitty off serrviice
swiittch capaciitty
vehicle
link stability
node rank
real-time online interactive application
roia
network operating system
nox
ces
mplste
switch capacity
number of queues impact
qoe evaluation
bandwidth isolation
mobile-rpl
adaptive link quality
low power lossy network
malqi.
packet size optimization
2-hop
time diversity
wireless body area network
5g network
mobile core network
ip-in-ip
gre
energy harvesting
decoding sinr
uplink throughput maximization
full-duplex
self-interference
inter-cell interference
wireless internet
See more
- Presentations
- Documents
- Infographics