Trending Topics
Trending Topics
Middleware Technologies for IoT Federated Learning for Healthcare Data Analytics
Mobility-aware RPL for Mobile IoT Federated Learning for Cyber Security
DTLS Security for COAP Protocol Recent Advances in Deep Recurrent Neural Networks
Security Mechanisms for COAP Protocol Deep Autoencoder Architecture and Applications
Design and Analysis of MQTT ProtocolAdvanced Deep Learning Methods for Medical Imaging
Data Access Control Framework for IoT Deep Neural Networks for Speech Recognition
DDoS Attack Detection in the IoT Federated Learning for Robotics and Automation
Identity-based Encryption in the IoT Deep Neural Networks for Computer Vision
Lightweight Authentication for the IoT Deep Learning for Data Stream Processing
Ultra-Low-Power Sensing Framework for IoT Deep Learning for Time Series Analysis
Industrial IoT Deep Ensemble Learning
Big Data Management for IoT Deep Learning for Malware Detection System
IoT Enabled Business Models Deep Learning for Intrusion Detection System
Context-Aware Computing for IoT Deep Learning for Intelligent Wireless Networks
IoT with Next Generation Wireless Systems Deep Learning for Big Data Analytics
IoT with Edge Computing Extreme Learning Machines
IoT with Fog Computing Deep Learning for Intelligent Vehicular Networks
Digital Forensics Investigation Process Models Protocols and Algorithms for Blockchain
Quality and Legal Standards for Digital Forensics Consensus Mechanisms in Blockchain
Social Media Forensics for Android Device Blockchain Security for Edge Computing
Logging and Log Synchronization for Cloud Forensics Blockchain Models in Government and Public Serv
Big Data Forensic Analysis Distributed Consensus and Fault Tolerance Mecha
Proactive Big Data Analytics for Digital Forensics Performance Analysis and Optimization of Blockc
IoT Forensics
on Prediction
Neural Networks
tion Systems
arning Models
guage Processing
ated Learning
onal Networks
e Intelligence
Detection Systems
or Language Understanding
Cloud
Computin
Vehicular Ad Hoc Networks Wireless Sensor Networks g
Federated
Cloud
Computin
Federated Learning for Internet of Veh Clustering Techniques in WSN g
Cloud
Computin
g
Infrastruct
ure for IoT
Data
Mobility Management and Mobil Bio-Inspired Clustering in WSN Processing
Pricing
Models
for Cloud
Computin
Cognitive Radio-based VANET Data Aggregation in WSN g Services
Dynamic
Security
Provisioni
ng in
Artificial Intelligence Techniqu Cluster-based Data Aggregation TechniquCloud
Cloud
Usage
Blockchain Models for VANET Secure Data Aggregation Techniques in Patterns
Cloudlet
Computin
Enhancing emergency vehicle co Energy-efficient MAC protocol for WSN g
Cognitive
Cloud
Computin
Congestion prediction-based eme Mobility Management in WSN g
Container
Computin
Localization System for VANET Sink Mobility for WSN g
Micro
Cloud
Computin
Reinforcement Learning based Ro Energy Efficient Sink Placement for WSN g
Mist
Computin
UAV assisted VANET architecture Underwater Sensor Networks g
Mobile
Ad-Hoc
Cloud
Computin
VANET for Intelligent Transport Routing Protocols for Underwater Sensorg
Serverless
Computin
Vehicle–to–Vehicle Communicat Trust and reputation-based approaches g
Social
Cloud
Computin
Vehicle–to–RSU Communication Intermittently Connected Delay-Tolerant g
Software-
Defined
Computin
Vehicle to Infrastructure Commu Distributed Database Management Techng
Volunteer
Computin
Cellular Networks for Vehicular Airborne Relaying in WSN g
Task
Schedulin
g and
Resource
Allocation
in Cloud
Computin
Cloud Computing for VANET Cooperative Relaying in WSN g
Load
Balancing
in Cloud
Computin
Hybrid Networks for Next Gene Deployment Strategies in WSN g
Heuristic-
based
Load
Balancing
in Cloud
Computin
Smart City Environment for VA Replica Attacks in WSN g
VM
Consolidat
ion based
Load
Balancing
in Cloud
Computin
Security in Service-oriented V Attack Detection and Prevention Schemeg
VM
migration
for Load
Balancing
in Cloud
Computin
Security Issues and Defense Me Efficient Flooding Techniques in WSN g
Virtual
Machine
Selection
and
Placement
in Cloud
Computin
Emergency Communications in Intrusion Detection System for WSN g
Energy
Managem
ent in
Cloud
Computin
Clustering in VANET Congestion control and Avoidance in WS g
Energy-
aware
Task
Schedulin
g in Cloud
Computin
Key Distribution in VANET Cluster-based Routing Techniques in WS g
Energy-
aware
Resource
Allocation
in Cloud
Computin
Safety and Driver Assistance in Anycast Routing in WSN g
Energy
Efficient
Load
Balancing
Technique
s in Cloud
Computin
Authentication in VANET Multicast Routing Techniques in WSN g
Energy
Efficient
VM
Migration
in Cloud
Computin
Trust Management in VANET Context-aware Routing in WSN g
Energy
Efficient
Workflow
Schedulin
g in Cloud
Computin
Privacy Issues in VANET Multipath Routing Protocols for WSN g
Meta-
Heuristic-
based
Energy
Optimizati
on in
Cloud
Computin
Location privacy in VANET Opportunistic Routing in WSN g
Energy-
aware VM
Selection
and
Placement
in Cloud
Computin
Privacy and Trust Management Bio-Inspired Routing Techniques in WSN g
Workload-
aware
Energy
Managem
ent in
Cloud
Computin
Intrusion Detection System in Energy-efficient Routing Protocols in WS g
DVFS-
aware
Server
Consolidat
ion in
Cloud
Computin
Sybil Attack Detection in VANE Cluster-based Intrusion Detection Systemg
Energy-
aware
Resource
Scaling in
Cloud
Computin
Video Streaming in VANET Data Transmission Scheduling Techniquesg
Workflow
Schedulin
g in Cloud
Computin
Routing Protocols for Smart Cit Energy Efficient Sleep and Wake up Schedg
Hybrid
workflow
scheduling
in Cloud
Computin
Intelligent Routing Protocols i Security Attacks and Secure Routing in Wg
Soft
Computin
g
Technique
s in Cloud
Computin
Opportunistic Routing in VANE Lightweight Cryptography algorithms for g
Task
Schedulin
g
Optimizati
on in
Cloud
Computin
Handover Schemes in VANET Lightweight Authentication for WSN g
Resource
allocation
Optimizati
on in
Cloud
Computin
Bio-Inspired Routing in VANET Secure Key Management for WSN g
Hybrid
Metaheuri
stic
Algorithm-
based
Task
Schedulin
g in Cloud
Computin
Scalability Issues in VANET Multichannel protocols for WSN g
Meta-
heuristic
Algorithm-
based
Optimizati
on of
Resource
Allocation
in Cloud
Computin
Congestion Control in VANET Cross-layer protocols for WSN g
Multi-
Objective
Optimizati
on in
Cloud
Computin
Congestion Avoidance in VANE QoS in Wireless Multimedia Sensor Netwg
Meta-
heuristic-
based
Profit
Maximizat
ion in
Cloud
Computin
Data Dissemination in VANET Neighbor Discovery Techniques in WSN g
Meta-
heuristic-
based
Workflow
Schedulin
g in Cloud
Computin
QoS Support in VANET Trust-Based Routing in WSN g
Genetic
Algorithm-
based
Workflow
Schedulin
g in Cloud
Computin
Broadcast Communication in V Connectivity Protocols for WSN g
Scaling of
Cloud
Beaconing in VANET Location Privacy in WSN Resources
Resource
Demand-
based
Allocation
in Cloud
Computin
Street-Centric Routing in VANE Coverage Hole Healing Techniques in WS g
Resource
Pricing for
Profit
Maximizat
ion in
Cloud
Computin
Pseudonym Management in VA Localization Algorithms in WSN g
Resource
Utilization
-based
Schedulin
g and
Traffic Differentiation and Sche Provenance Issues and Management in Allocation
QoS-
aware
Resource
Scaling in
Cloud
Computin
Software-Defined Network in Mobile Sink-based Data Gathering Technig
Game
Theory-
based
Methods
for Cloud
Computin
Internet of Vehicles Secure Data Dissemination Methods in g
Game
Theory-
based VM
Placement
in Cloud
computin
Applications of Game Theory in Coverage and Connectivity Issues in Het g
Cost
Optimizati
on using
Game
Theory in
Cloud
Computin
Deep Reinforcement Learning for Clustering Techniques in Heterogeneous g
Machine
Learning
methods
for Cloud
Computin
Congestion Avoidance in WSN g
Load Balancing in WSN
Fog Computing Edge CompCloud SecuMobile Cl Data MininBig Data
Computational Offloadi Reliable E Cloud Com Offloadi Classifica Big Data Analytics
Scheduling in Fo Priva Securi MCC A Assoc Big Data Models and Algori
Fog Device Virtua Federa Blockc Conte Text Big Data Visualization
Adaptive Fog Co Patter Cloud Resou Natur Big Data Analytics for Busines
Green Fog Compu Privac Relia Task Infor Big Data Analytics for Smart
IoT Data Processi Intell Artific Resou Quest Parallel Programming Techniqu
Reliability-aware Comput Intrus Load Socia Software and Tools for Massiv
Delay-aware Fog Artifi Deep L Task Spati Scalable Architectures for Mas
Quality of Experi Place Securi Energ Seman Scalable Storage Systems for
Container-based Vi Compu Distri SLA-b Data Large Scale Data Analysis for
Proactive Service Edge Securi Meta- Stock Hadoop Programming and Map
Profit-aware Reso Profi Data Integrity an Patte Privacy Preserving Big Data A
Energy-aware Task Conte Real-time Analysis of Security Log Data for Alert Generation
Energy Efficient R Distri Intrusion Detection System with Event Logging in Cloud
Security and Priv Deep L Data Mining Techniques for Privacy Preservation