Personal Information
Occupation
Network Protocols & Wireless Networks
Industry
Technology / Software / Internet
Website
airccse.org/journal/ijcnc.html
About
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas
Tags
wireless sensor networks
routing
network security
internet of things
network protocols
security
networks wireless network
wireless sensor network
wireless networks
cloud computing
clustering
network architectures
machine learning
high speed networks
manet
iot
wsn
computer networks
computer network
network
routing protocol
qos
routing protocols
deep learning
quality of service
aodv
wireless communications
communications
load balancing
optical networking
sdn
5g
intrusion detection
ubiquitous networks
networking
networks
switching and addressing techniques
fuzzy logic
energy efficiency
ofdm
anomaly detection
blockchain
intrusion detection system
mobile networks
vanet
performance analysis
neural network
lte
authentication
6g
protocols
wireless network
localization
social network
congestion control
network lifetime
privacy
tcp
congestion
olsr
reinforcement learning
cyber security
residual energy
cluster head
feature selection
computer networks & communications
routing algorithm
cognitive radio
ids
rpl
cybersecurity
mimo
ipv6
leach
optimization
quality of service (qos)
cryptography
artificial intelligence
wireless
channel estimation
particle swarm optimization
long term evolution (lte)
network management
otfs
underwater wireless sensor networks
spectrum sensing
packet scheduling
mac
wireless lan
dsr
internet
bit error rate (ber)
wi-fi
network coding
wlan
wireless internet
steganography
handover
smart home
machine learning algorithms
voip
iot security
analytic hierarchy process
adhoc and sensor networks
resource allocation
clustering algorithm
delay
deep reinforcement learning
encryption and decryption
ensemble learning
multimedia
energy consumption
wireless sensor networks (wsns)
social networking
network protocols & wireless networks
aes
ad hoc network
mobile ad hoc network
network marketing
wireless mesh network
multipath
reliability
throughput
ipv4
wimax
vanets
attack detection
autoencoder
temperature
cognitive radio network
security effectiveness
social networks
trust
block cipher
goal question metrics
sensor node
web applications
nfv
vulnerability
energy-efficient
fog computing
multi-criteria
bittorrent
machine learning.
mobile network
apt
energy efficient
energy
mobile ad hoc networks
virus
performance evaluation
algorithm
mimo systems
authentication framework
supervised learning
healthcare
internet of things (iot)
iots
wireless sensor network (wsn)
streaming
urban area
topology
graph
web application
path planning
forward secrecy
openflow
cellular network
manets
network monitoring
cross-layer
packet loss
simulation
underwater wireless sensor net
logistic map
network on chip
lstm
distributed algorithms
actor critic
mutual authentication
contextual information
software defined networks
zigbee
topology control
q-learning
response time
graph theory
security analysis
mano
deep packet inspection
multipath fading
usability
cisco access points
adhoc
clock synchronization
wsns
cdma
information security
cognitive radio networks
satellites
compression
mobility
optimal packet length
edca
addressing techniques
communication
cross layer
next generation internet
data privacy
vehicle-to-everything
dsrc
dsdv
medium access control
humidity monitori
ibk
naivebayes
multilayer perceptron
gainratio
performance evaluation.
adjustable range load balancing protocol (albp).
chi-square
nbtree
correlation feature selection
network architecture
ultra-low latency
beyond 5g
network anomaly detection
multiple-input multiple-output
genetic algorithm.
data fusion algorithms
security.
elliptic curve cryptography
cellular mobile networks
traffic congestion
access control
ber
peer-to-peer
data mining
anomaly detection.
papr
opportunistic routing
cut-through
omega network
round robin algorithm.
waiting time
dynamic task scheduling
data aggregation.
tree-based
psnr.
virtual neighbour table
neighbour table
energy-saving application
hello interval
link change rate
hello process
cache replacement.
in-network caching
cooperative localization
extreme learning machine (elm)
border gateway protocol (bgp)
multi-path routing
key distribution
simulations
paillier cryptosystem.
eigentrust
homomorphic cryptosystem
p2p reputation management
cluster
health information management
global mobility network
communication system security
banyan networks.
hotspot traffic
uniform traffic
semi-layer multistage networks
dwt
whale optimization
mpto
monitoring.
multi-criteria decision making
filter bank
mobile
evolutionary computing
real time switching control criteria (rsw).
aomdv
awgn
mobile cloud computing
authenticated key agreement
game theory
visible light communication
wireless communication
wifi
named-data networking (ndn)
information-centric networking (icn)
scalability
scheduling
worms & trojan.
fgc
retrial
tdma
leach.
energy efficient (ee)
clustering approach
cluster heads (chs)
sound localization & wireless positioning.
otdoa
cellular networks
random waypoint model.
ml-drnn
multi-objective golden eagle o
resource-constrained network
layer depth
group signature
collective signature
digital signature authenticati
secure navigation
matlab
multiagent q-learning
radio resource management
hybrid code
two-dimensional
optical link
maximal ratio combining (mrc)
interleavers
interleave division multiple a
broadband powerline (bb-pl)
android
compressive theory
clusterhead
antennas
mse
ieee 802.11p
industrial internet
cognitive networks
leo
lorawan
snr
gps
mobile ad-hoc networks
synchronization
5g and beyond
node localization
massive connectivity
non orthogonal multiple access
software-defined networking (s
adaptive sensor sensing range (assr)
(wsn)
smart grid
sniff
rule table
firewall
store-carry-forward
direct communication
v2x communication
improved throttle algorithm.
processing time
queuing delay.
explainable ai (xai)
shapley additive explanation
non-orthogonal multiple access.
bit error rate
v2x communication.
mobility models
hesitant fuzzy linguistic term
raspberry pi
benchmark
mosquitto
mqtt
neural network.
unsw-nb15
gradient boost classifier.
fpa
custom features
unsw-b15
error minimization.
hybrid beamforming (hbf)
massive multi-input–multi-output (mmimo)
millimeter-wave (mmwave)
distributed lifetime coverage optimization protoco
adjustable range deterministic energy efficient pr
deterministic energy efficient protocol (deep)
multi user
data gathering
node degree
virtual machine.
dynamic scheduling
integer programming
makespan
rayleigh fading channels.
utilization resource prediction.
voice-assistance
intent-based networking & realtime visualization
multicore
markov chain
leach algorithm
deadline
ibleach algorithm
energy conserving
smart mobile devices
user equipment
handover decision
carrier aggregation
machine learning for iot
markov reward models
attack graph
non-homogeneous markov model
cluster distance
bce-leach
timestamp
infogain
positioning
ieec-a
ddos
bs
unsupervised learning
oee-wcrd
alamouti
quantum resistance
hello routing
next generation web architectures
isogenies
empirical evaluation
virtualization
quality of experience
internet and web applications
power control
complexity reduction
hyperelliptic curves
signal strength
unmanned aerial vehicles (uav)
efficiency
burning ship fractal
hilbert transformation
wsn.
dynamic diffusion
ieee 802.11
fintech
cw
par
masked data
channel assignment
data delivery
wormhole routing
visually image protection
ddos attack
service level agreement
pox
ryu
wireless multimedia systems
network operations & management
sdn controller
sensor networks
honey badger optimization
orchestration
multiple web access
co-channel interference
home automation
pan
live streaming
wireless body area network
cloud security
prediction
heterogeneous wireless network
infrastructure and platforms design tool for cloud
cloud application
trust score
parameter optimization.
mobility speed
deepmimo
mmwave
coordinated beamforming
mobile ad-hoc network (manet)
content distribution
self-pruning
routing in iot. packets aggregation mechanism.
high-performance iot
bloom filters
context-aware addressing
peak-to-average power ratio
continuous-time markov chain
pdr.
csma
eec
hwsn
swarm intelligence
relay node placement
iptv
diffserv
heterogeneous networks
flow label
qoe
zero trust architecture
cryptographic algorithms
lifetime
adaboosted ensemble learning
routing attack
urllc
random access
signal propagation
hybrid access scheme
field-programmable gate array (fpga).
hybrid model
switchable data dependent operation (sddo)
controlled substitution–permutation network (cspn)
interference-to-interference-plus-noiseratio
signal-to-interference-plus-noise-ratio
iot edge security
long time evolutionadvanced
multimedia etc big data tools and systems big data
bioinformatics
privacy and trust big data applications
models and algorithms big data infrastructure and
big data techniques
performance prediction
reputation
digital tokens
fuzzy logic control “flc”
cellular
ad hoc
industrial internet of things
real-world networks
attack
dynamic coin output model
consensus mechanism
traffic engineering
genetic algorithm
network topology
radio frequency attenuator
torus
radar isac
codec
sip
hexagonal
internet mobile gateway select
vehicular relay selection & ro
ad hoc networks
security culture
security awareness
botnet
spider swarm optimization
p2p botnet
communication graph
music
single-board computers
data shifting
interest selection
vehicular named data networks
anchor node
mean square error
tapped-delay line
application shimming
modeling
pruning
stepwise conditional parameter
rendezvous sequence
sensor network
neighbour attack
ns-3
post-disaster scenario
worms &trojon
high mobility
internet of medical things
anti-jamming technique
complexity
jamming attack
networks & communications
networked systems
agriculture
phishing attack
information diffusion
mpr
cluster feature vector
cellular mobile network
available bandwidth estimation
adjacent channel
co-channel
spectrum sharing
peer selection
distributed
resource management
multipath routing
ddos attacks
statistical analysis method
dynamic entropy
http
vehicular ad-hoc network
software defined network
video streaming
healthcare service
quality of service metrics
quality of experience metrics
optimal network path
data accumulation
crossover
levy flight
bluetooth low energy
mimo-ofdm
route discovery
mobile ip
algorithms
imbalance data
machin learning
ransomware
millimeter wave
range-free methods
vulnerabilities
blockchain security
information technology
hash chain
measurement
virtual routing function
deep deterministic policy grad
packet-switching networks
monitoring
asset tracking
e-content
privacy preservation
spectrum efficiencies
system capacity
content-centric networking
ray tracing
vehicular networks
fixed-grid network
multiuser precoder
phishing
dd
network bandwidth
data aggregation
software defined networking (sdn)
rdm
android malware detection
frame size optimization
edge detector
requirements
heterogeneous traffic
support vector machine
share generation
des
interactivity
lsb technique
throughput optimization
vehicle velocity
big data
neighbor density
throughput (tp)
key exchange
fbmc
fog-cloud
blowfish
malware detection
ant colony optimization
privacy protection
smart transportation system
entropy measu
correction method
adversary
arithmetic coding
energy detection
pseudonym change
dynamic authentication
internet marketing
computing
approximation
downlink mu-mimo
grpc
dataset
ad-hoc
multifactor authentication (mfa)
rest
fingerprint recognition
olsr routing
6g potential applications
web architectures
arnold map
dct
web attack
dynamic selection
node residual energy
radar sensing
iomt
quantization
tailored treatment
image compression
link quality
wban
real time traffic
filter bank multicarrier
mobile ad hoc
visual cryptography
millimeter-wave mimo systems
enhanced efficiency
route establishment
peafowl mating
iris recognition
random oversampling
data security
biometric
heterogeneous network
small-world networks
hpc clusters
ssh tunnelling
spin
maximal clique size
qualnet
clustering coefficient
csp
network graphs
assortativity index
pso
correlation
distribution
nodes
self-organizing map
information dissemination
wireless application
autism
delay rate
slotted antenna
immunization
parallel crc computation
software as a service
broadband antenna
infrastructure as a service
pts
distributed computing
and cloud compliance.
triangular microstrip antenna
substrate
energy saving
hlts
nfs
network simulator 2.
wireless sensor networks.
tcp incast
data center
ccdf
characterization
network simulation
radio propagation models
cost-minimizing algorithm
coap
m2m
distributed file system
sla
attention shift
ozo generator
intra-band contiguous
forensic system architecture
database management.
triangulation
modified largest weighted delay first (mlwdf)
confidentiality
dynamic position
tracking
zone prediction
lte-sim-5.
multipath fading.
mincuts
non-state-space model
and reliability.
attack trees
evolutionary system
integration
linear receivers
scale-free network
logarithmic rule (log-rule)
self-optimization
node- dependent
carrier aggregation (ca)
explicit loss and handoff notification
eigenvalue
small-world network
high bit error
cellular wireless network
random network
spectral radius
handoff
computer networks; minimum-cost paths tree; geneti
network stack composition
network forensics
heterogeneous networks (hetnets)
forensic analysis system
broadcast communication
mobile device
mobility load balancing
statistical methods & packet length.
life-time
matlab.
remote healthcare
device-to-device
kdd’99
mode selection
interference control
labview
kernel selection
minimum total network cost.
compuetr networks
ns2.
wireless broadband
power consumption
exponential rule (exp-rule)
nsl-kdd
rate control.
lte-advanced (lte-a)
femto-cells
deadlockfree
lyapunov exponent
split-protocol
kernel
broadcasting communication
hamiltonian model
3-d mesh topology
3-d mesh
patient monitoring
chaotic codes
lte networks
deadlock-free algorithm.
chemical networking protocols
application weight
dynamic weight
unified qos metric
radio propagation
energy efficient sensing
planning
gis
dual band
cooperative spectrum sensing
home network
hsi color space
gis layers
l*a*b color space
residential energy management
classification
lsb
mp3 data set
hiding a message
integrated system
nms
information-centric networking
rats (radio access technologies).
cba
efficiency criterion
cost analysis
web services
network address translation
noc
complexity.
health & ansprolog
lattice
logic programming
lll
lr-aided
peer selection algorithm
topology change
mobile applications
p2p live streaming
connected dominating set
virtual backbone
wavelets
digital video broadcasting
frequency selective
ricean
rayleigh
as-friendliness
owdm
qos metric
dra
opportunistic relay selection
dcs and wlan
grp
selfish nodes
manet.
performance.
zigbee & rfid.
global positioning system
improve accuracy
hierarchical hybrid edf/fifo
accuracy factors
ls
mmse
cazac sequences
cooperative communications
frft
sto
mptcp
congestion controls
multi-homed
middleware & platform
management
adaptive m-qam/mpsk modulation
orthogonal least squares ”ols”.
fuzzy basis function “fbf”
weight
non real time traffic
virtual mmachines
ims (ip multimedia subsystem)
cloud computing.
lload balancing parameters
vho (vertical handover)
visible light communications
ansf (access network selection function)
mih (media independent handover)
connectivity.
indoor communication
wireless ad hoc networks
transmission range
link distance
lightfidelity
optisystem 7.0
visibility
atmospheric attenuation
free space optical communications
hello flood attack
passive attack
active attack
key management.
vngn
vrf
cross-layer scheduling
vlan
onf
openflow and openstack
auction cluster head
packet delay
vnf
encapsulation
multi-bs
optimisation
mass balancing theorem
cloud sensor
flow networks
different service quality
multi-hop
total processing time.
multiple access points
joint multiple resource allocation
transmission power
packet reception ratio (prr)
distributed optimisation
potential game
decision making system
soc
peer-to-peer networks
distributed algorithms.
performance bounds
multimedia streaming
wireless multimedia sensor networks.
federation
access control.
identity management
federated clouds
orthogonal frequency division multiplexing.
odp polynomial
compressed sampling
sdl (specification and description language)
safety and liveness property.
validation
node monitoring protocol(nmp)
multicast
guarantee qos
adaptive service agreement
service level agreement (sla)
cloud service broker
reduction of power consumption
vertical handover (vho)
cooperative relay diversity
dynamic bandwidth distribution.
peer-to-peer (p2p)
overlay multicast tree
hybrid
smart cities
cost estimation
city services
cloud architectures
heterogeneous wireless networks
adaptive retransmission
hybrid protocols.
policy-based network management
dacs scheme
self-configuration
received signal strength indicator (rssi)
wireless sensor network (wsn).
levenberg-marquardt (lm) algorithm
user satisfaction
link cost
peer-to-peer; live streaming; internet service pro
and software fault injection & composed web servic
bandwidth allocation
fault tolerance methodologies
wi-fi.
cloud computing; cloud services; quality-of-servic
mobile cloud offloading
alternative cluster head nodes
connected candidate order
hysteresis
call admission control
mobile relay node
wireless sensors network (wsn)
media independent handover (mih)
dynamic clustering
broader gateway protocol (bgp)
energy balancing
token based coordination
security kernels
optimal cluster size
video on demand
interactivity.
authenticated data structure (ads)
adaptive modulation and coding
cross-layer design
andsf (access network discovery and selection func
web browsing & mobile networks
wifi cellular interworking
network failure tolerance.
intelligent transportation system
smart vehicle
grx (gprs roaming exchange)
ipx (ip exchange)
roaming
white label
interconnection
peering
hosted
long- reach passive optical networks; dynamic band
tora
psnr
real time traffic.
mesh-pull backup
multicast trees
resiliency technique
scalable codec
node disjoint routing
histograms of colour image
qos routing; mobile ad hoc networks; energy-aware
double stack
tcp and rtt
bgpv4
ospfv3
isp
qam & wdm.
breadth-first search tree.
sirs epidemic model
dtmc markov model
epidemic disease
approximation algorithms
greedy algorithms
sirs epidemic model
graph matching
vertex cover
simulations; mpls; traffic engineering; fast rerou
event handling
in-network aggregation
dtmc markov model
attacker
signature
virtual backbone tree
hierarchical clustering.
wormhole attack
number portability
query on release
qos routing
call dropback
onward routing.
all call query
video recording
honeypots
hypervisor
complementary cumulative dist ribution function (c
orthogonal frequency division multiplexing ( ofdm)
nids
hids
adt-android development tool.
gui-graphical user interface
ide-integrated development environment
cross-layering
inf ogain
inline measurement tcp (imtcp)
voip capacity
codec adaptation.
vowlan
smo
gsa
lkh
multimedia broadcast multicast services
dynamic rekeying
isi
fft
multi-carrier
available bandwidth
bandwidth measurement
dvb
accident.
multiplexing techniques
digital modulation formats
ieee 802.16d
sui- 4
16-qam
64-qam
sui-6.
qpsk
bpsk
sui-1
sui-2
sui-3
sui-5
adaptive colour image steganography
mobile ad hoc network (manet)
random pixel selection
collision avoidance.
difference in histograms
steganogaraphic noise
energy detection .
bam
management dynamic
alloctc
modelling
mobility management
qos management
iqmsmp
internet vulnerabilities and medical identity thef
profile of qosr
ngn
reac
cyber attacks
passive measurements
admission control
cognitive network
identity theft
hybrid-based methods.
data stores
range-based methods
node coding
resources
encoding strategy
narrowband rf networks
integrity
network computing
cloud service provider and cloud security.
binary exponential backoff.
linux.
g-rdm
mam
firewall.
projection
formal correction
eigenvalue spectrum
formal verification
misconfigurations detection
relevancy
reciprocity.
interoperability cheking
radio resource management (rrm)
proposed economic model
ufas
security component
maximum network welfare.
stream cipher
encryption oracle
mode of operation
quantum communication
phase shift keying
xbee
kdd cup 99
cluster 3.0
visualization
k-means
treeview
short message service
sms
qos routing. 1. introduction
hierarchical routing
naming mechanism; name-specifiers; predicate-based
rank revealing
qr factorization
null (noise) space
frequency estimation
time delay
signal space
subspace estimation method
security of e-content
lu factorization
root-music.
matrix decomposition
cooperative stbc
multi-media. 1. introduction
e-protection
cooperative communication
low complex sphere decoder.
outage probability
golden code
spectral efficiency
epidemic disease
system & network vir tualization
ims
resource provisioning
autonomic management
alloctc-sharing.
bandwidth allocation models (bam)
phone system
highly available
ip
telecommunications
fast handover.
hierarchical mobile ip
mipv4
mipv6
bloom filter; zfilter; zformation; diffie-hellman-
multimedia sensor networks
security of e-content
video transmission
distributed coordination function
multi-media. 1. introduction
wlan network
802.11b
fairness
e-protection
performance & 802.11p
gsm
non-deterministic delays
sensor
applications
multi carrier
multi carrier
lognormal sum
moment matching
log skew normal
amplitude clipping and filtering (acf)
elliptic filtering (ef)
iir (infinite impulse response
amplitude clipping and filtering (acf)
iir (infinite impulse response
elliptic filtering (ef)
interconnection topology
hex-cell topology
hex-cell topology
interconnection topology
dna
nist
mixcolumns
mds
power management
bottleneck energy
uwsn
fuzzy c-means
degree of freedom "dof"
matlab simulink
addressing types
802.15.4
rdp
remote desktop environments
user’s perceived operability
tesbed
fleetnet
its
queuing theory
tcp v ariants
mobility .
real time
priority of traffic flow
history routing data
bandwidth - guaranteed routing alg orithm
broadcast trees
secure clustering
dynamic clustering and data aggregation
remaining energy
coverage loss time
node lifetime
web service
maximum stability
programming models
adhoc using cisco devices.
heuristic algorithm
tcp computation enhancement
qos for routing
routing path.
eventual consistancy
wireless ad-hoc networks
smart routing.
artificial fish swarm algorithm
node clustering
peer-to-peer streaming
link prediction
dpcplp
embedding
hex-cell network
expansion
dilation
ftlr scheme
lognormal shadowing model
model unit disk graph model
directories
complex and virtual devices
representational state transfer
notch antenna
reliable hetnet
non-deterministic delays
step-size.
grid point approximation algorithm
maximizing network interruption problem
security breaking cost
mobile payment
and encryption.
distributed coordination
spectrum heterogeneity
slave
dual-slave
control channel dilemma
minimum distance spanning tree
coordinator
mobile sensor networks
sara
ant based routing
petal routing
prior storing server
internet protocol television.
video contents
passive optical network
teks
white space steganography
lzw
socioeconomic indicator s
imaginary value
phase sensitive detector method
re al value
bioimpedance
tetrapolar
chebyschev
interasterisk excha nge protocol (iax)
interworking
topology construction
topology maintenance.
enr
node classification.
erasure code
best effort
pfr
optimized edge routing
performance routing
network life
queuing delay
heterogeneous
transmission opportunity
pops virtual mobile ip network.
internet service provider
rout discovery
wavelength conversion
mobile service
mobile agents
sn mp
psd.
elliptic
energy co nsumption
ns 2.
link aware.
butterworth
application level multicast
orthogonal
multicast tree
overla y networks
multi-hop relay stations
fairness and throughput
mobile stations
sched uling
middleware
mo bile device
ifft
mobile social network
wide area network
dvb-t
traffic density
shortest path algorithm
insteon
waveins
distributed manet management
6to4 tunnel
manual tunnel
piece selection
social networking websites
peak to average power ratio (papr)
orthogonal frequency division multiplexing (ofdm)
cumulative complementary distribution function (cc
high performance computing
heterogeneous environments
parallel computing
sir model; seirs model; delay differential equatio
lte; mimo ;ofdm
dynamic spectrum access
bluetooth network
cyber threats.
jammer technology
vanet; mobility model; simulations
round trip time (rtt)
passive optical network (pon)
dynamic bandwidth allocation (dba)
ipv6 header and exhibition date.
intrusions
huffman coding
traffic matrix
point of presence
mobile ip border gateway
intrusion prevention
deauthentification
packet injection
tools
smart phone forensic
digital forensic
internal memory
digital evidence
analysis
wavelet- eigen vector
de-noising
wavelet
wavelength and converter assignment problem
eigen vectors component.
m/d/1 with vacations
mean waiting time
m/h2/1
voice control
energy management
wdm
z-wave
industrial automation
assistive homes
single carrier effect
generalized dft
papr reduction
physical unclonable function
red deer algorithm
standard-deviation based encod
variable encoding
dynamic spectrum allocation (d
single carrier-frequency divis
ws-olsr
mpr selection
wingsuit flying search
broadcast storm problem
tomek links
imbalanced data
distributed denial of service
feature extraction
tuning parameters
web usage
usage mining
http csic dataset
tomek link
5g and networks for big data
database and system security
security & ai integration
security & network management
security in remote work
cyberattack detection system
clustering techniques
3-dimension
real-time monitoring
qos metrics
orthogonal frequency division
peak to average power ratio
selective mapping
filtering and clipping
aodvmo
one-time passwor
eagle optimization
euclidean distance
electronics
information technologies
successive interference cancel
mmtc
ijcnc
computernetwork
télécommunications
bandwidth
radiation efficiency
microstrip patch antenna (mpa)
decentralized clusting
relay node.
light regions
comp
physical unc
cw.
signal to noise ratio (snr)
b
standa
dft spreading
wearable wireless sensor secur
ul-a
anti-phishing
non-content bas
network securit
blockchain technology
vanet security
internet of thing
url phishing
newcwv
bursty tcp traffic
improved reptile search algori
nature inspired computational
convergence rate
cicids-2018 dataset
system calls
ecc
data
bluetooth
low energy
wireless sensor
rateless
advertisement
congestion detection
rateless and wireless sensor
mobile wsn-iot
k-means clustering
ch selection
weight function
fnd
techniques
high-traffic networks
posterior belief
3-dimension markov chain
quasi birth-death (qbd)
retrial queueing
ad-hoc network
unlicensed band
ranging localization methods
broadcast latency problems
reachability
average latency etc
vanet-lte integration
t
mobile adhoc network
broadcast latency problems;
dynamic
security training
security management
graph-mining
secure routing
kvm
benchmarks
kernel-based virtual machines
technology
radio technology
secure system
wearable wireless sensor
fifth-generation radio technol
forwarding probability
connectivity metric.
unmanned aerial vehicles
internet of everything
channel modelling
propagation model
fifth generation.
qlrp
qltpc.
iov
deep convolutional neural learning
protection motivation theory
fear motivation
digital native
digital immigrant
information privacy
antivirus.
machine authentication
cryptography.
knuth shuffle method
image encryption
parallel processing
digital communication
pulse position modulation.
big data security
microstrip patch antenna
design optimization
ultra-wideband.
hpv vaccination
gini index
locality awareness
replication.
cooperative systems
rayleigh fading channels
case studies
failure probability
sensor lifetime
subsets
classification model
random forest
k-nearest neighbors
naive bayes.
algorithms and applications bioinformatics compute
transmit power.
transmit power
biogeography based optimization
optimal route
vehicular ad hoc network
visible light communication.
ims & mipv6
greedy algorithm
mmpp
ims & mipv6.
greedy algorithm.
mmpp.
traffic shaping
nfv.
broadcasting
flooding
neighbour coverage
delay sensitive
packet capture
packet capture.
raspberry
cognitive radio resource
dos attack
rf energy transfer
multiplicative interleaving wi
sac-ocdma systems
nzcc code
md code
spectral/spatial dimension (sd
humidity monitoring systems
energy reservation
environmental monitoring
signing group
multiplicative interleaving
tree algorithm (mita)
network protocols & wireless n
machine learning attack
xor-puf
one-time password
security routing protocol
quality-of-service (qos).
successive interference
wireless sensor networks (wsn)
sensor nodes (sns)
anchor nodes (ans)
rof-based radio access network
long-te
income inequality
rstudio
american adolescents
multiscale analysis
multilayer representation
graph signal processing
truncated mean
clock time duration.
mfo
stable & vanet.
context-aware architecture
probabilistic voting-based filtering
false positive attack
false negative attack
network security.
extended clas
elliptic curve encryption.
sumo.
data accuracy.
sumo
data accuracy
qos.
threshold based vm placement technique for load ba
virtual machine
aodv routing protocol
aodv routing protocol.
privacy.
security and privacy for iot iot-enabled innovatio
delay sensitive.
adhoc networks
framed slotted aloha
aloha-q
transmission probability
etx
routing metric
objective functions
clipping
threshold
estimation
eigen decomposition
improved elliptic curve
rnn
packet classification
handover authentication
lightweight hashing
ant-colony algorithm
harris hawk algorithm
improved elliptic curve crypto
distributed system
asynchronous clocking
conflict resolution
race condition
k-framework
language semantics
pccl
automation
post-quantum cryptography
e ciency gains
fintrust blockchain framework
link’s fineness
spatial relation
ns3 simulator
navigation systems
neural networks
innovation
wireless internet'
network operations
cooperative radio
hard fusion rule
additive white gaussian noise
non-cooperative wideb
spectrum sensin
cooperative wideb
movable anchor
priority scheduling
data packet
mobile agent
itinerary planning
smote
network security laboratory
shortest -path algorithms
entropy
mechanization
navigation
sensor errors
low-cost inertial navigation
system
scopusindexed
scopuspublication
conflict flows
online active learning
rerouting
queue congestion
military areas
multi-hop free space optics
malaga turbulence
pointing errors
qam
multi-hop wsn
clustering routing
rdmsca-levy
energy hole
voronoi cell
node repositioning
metaheuristic algorithms
delay optimization
hyperparameter tuning
security protocols
key agreement
cyber physical system
zero-day attack prediction
hybrid game theory
transfer learning
resnet50
ann-ae
cnn-lstm
bi-lstm
ensemble neural networks
olfoa
quality of service(qos)
transmission delay
latency
post-quantum cryptography;
eciency gains
fintrust
blockchain framework
personal data security
cybersecurity framework
e-governance
data protection
regulations
secure digital identity
variational autoencoder
bler
shortest path
source node
target node
virtual mimo
esso
network traffic classification
netml dataset
ai-driven
uav
3d mapping
iot-enabled sensors
modified proportional topology
enhanced seeker search optimi
multi-layer deep recurrent neu
windows
shimming
radio network
spatioconstraints
mayfly optimization
delay efficiency
nsl-kdd dataset
kyoto dataset
two stage detection
mean detection time
architectural styles
orchestration and rest
resource utilization
multipoint relay
topology maintenance
message control
architectural
cloud
isolation forest
local outlier factor
smart designated node
intrusion detection systems
dimensionality reduction
multi-server security
cryptanalysis
fuzzy commitment
sdwn
nonlinear programming
macstrategy
high performance
queuing dela
intelligent transportation sys
salp swarm algorithm
multi objective optimization
stable election protocol
contact tracing
covid-19
confidence interval
lightweight environment
smart contract security
os pen testing
exploit windows
persistence attack
mininet wi-fi
association control
access point selection
software-defined wireless net
content dissemination
content forwarding
network performance
spatio-constraints
cognitive radio network (crn)
intelligent systems
software process
web engineering
l software engineering
software maintenance
knowledge-based systems
formal methods
testing
federated learning
threat
mcdm
mitre
nantar algorithm
machine learning techniques
cse-cic-ids 2018
litnet-2020
reactive
rwp
reinforcement learning-based r
automatic
cognitiveradio
deeplearning
mask r-cnn
instancesegmentation
direct-to-satellites
inertial navigation systems
ins errors
convolutional neural networks
packet drop
end-to-end delay
best-effort network topology
eniao
fish school search routing
duty cycling
wsn optimization
adaptive hybrid deep learning
mprs selection
flow classification
architectures
wireless multimedia
mac strategy
traffic index
traffic sensing systems
ifog-simulator
mish
cnn-bigru
hogzilla dataset
sha-1
message digest
data integrity
digital signature
national security agency
cluster-based routing protocol
low-power and lossy networks
position information response
position information request p
pdr
eecrpsid
non-interactive zero-knowledge
radio networks
mobile marketing
radar
software development
software
software testing
per
differential privacy
elastic optical network
cloud applications
software-defined network
traffic flows
virtual data center
artificial bee colony (abc)
fuzzy logic system.
autonomous underwater vehicle
mission planning
heterogeneous group routing
evolutionary algorithm
encryption
mpi
supercomputer
attributed hierarchical graphs
big graphs
information visualization
visualization systems
secret sharing
lightweight cryptography
public key cryptography
fuzzy classifier
differential evolution
binary harmonic search
akaike information criterion
distributed leader election
internet gateway discovery
server
lan security
lanenforcer
mobile adhoc networks (manets)
dynamic source routing (dsr)
preemptive routing
synchronization process
packet communications
asynchronous data stream
discrete information
channels with a random multiple access
program modeling
control flow
petri nets
composition operations
multi-commodity multi-cost flow
linear-programming
divide and conquer (d&c)
divide and conquer quad tree based multi hop stati
energy efficient routing protocol (eerp)
energy efficient wsns (eewsns).
response surface methodology
and modeling
design of experiments
minimum total network cost
fuzzy system
firefly algorithm
ieee 802.11af
ieee 802.11e
white-fi.
path splitting
virtual optical network
virtual network embedding
deterministic channels
network performances
mobile ad-hoc networks (manet)
self-organized networks (son)
ring
mcr
static routing algorithm
dynamic fault-tolerant routing.
lighting control
dimming
acoustic
underwater wireless device networks
void region
and normalized depth.
lightweight encryption
simeck
bandwidth optimization
energy consumption (ec)
efficient reliability and interval discrepant rout
average delay (ad)
execution time (et)
and bandwidth utilization (bu).
communication networks
data center network
flow scheduling
network partition
stochastic scheduling model
software defined networking
real-time online interactive application
roia
ips
security hardware
multi-core processor
configuration model
multiple displays
pervasive display
content
user engagement.
multiple input multiple output(mimo)
orthogonal frequency division multiplexing(ofdm)
peak to average power ratio(papr). space time bloc
homomorphic encryption
elliptic curve cryptography (ecc)
elliptic curve digital signature algorithm (ecdsa)
honest-but-curious attack
malicious attac
pmipv6
aaa
fast handov
processing time.
housekeeper
robot
human
tasks.
data security and privacy for cps
wireless sensor network security and privacy
multimedia traffic
routing.
single path
recursive least squares (rls) algorithm
energy-aware
ad-hoc networks
power consumption.
is-is
ospf
route redistribution
igrp
eigrp
multicommodity flow
ciphertext
sac
s-box
secure algorithm
avalanche effect
advanced encryption standard
client/server
mobile agent .
contact center
communication channel
p2p communication
webrct
802.11ad
deep neural networks
joint multiple resourceallocation
cloud computing environments
position accuracy
error rate
carrier interference
average carrier power
oma
preemption
interconnection networks
network services
octagon-cell
interconnected networks
received power
code
electromagnetic radiation
power density
equipment spectrum analyzer.
global system for mobile communications (gsm)
radiation pattern
pgb
agf
fading channel
dirty paper coding
viterbi algorithm.
lattice encoding and decoding
indoor positioning
localisation
smart homes
internet of things & rfid
audio and video transmission
adaptive bitrate streaming
progressive download
global positioning system gps
forgetting factor (λ)
ota carrier
interference
grid
cell-head election& void-handling algorithm.
knowledge science
flow of knowledge
velocity of knowledge
social sciences.
traffic model
processor sharing
network measurements
insensitive fuzzy c-means
stable election protocol(sep)
sepinsensitive fuzzy c-means.
sensitive persons
electromagnetic radiation (emr)
emr exposure level
signalling protocol
network auto-configuration.
cloud robotics
openstack
apache
ros.
transmission energy
simulation analysis.
network attack
dark-net monitoring
topology map
adjacency matrix
laplacian matrix
total accessibility matrix
random channel
detection
priority-based data reporting
ieee 802.15.4 sensor networks
queue management
transport protocol
wsn testbed
congestion control.
home monitoring
has.
adhoc wireless networks
adhoc routing
event condition action (eca)
fat-tailedness
kurtosis
centrality metrics
degree distribution
concordance
opportunistic fair scheduling (ofs)
zero-forcing beamforming (zfb)
channel capacity
lte downlink
spate time block coding and throughput.
adaptive routing
disjoint paths
3d grid
data-oriented privacy
secure data aggregation
spread spectrum.
uwsns
nemo
diffserv.
mcs
opportunistic networks
smart city
virtual machine migration
vertical compression
horizontal compression
data reliability
path selection
confidence
priority
fuzzy optimization.
virtual cache
virtual wan accelerator
content delivery services
minimum network cost
black-hole attack
discrete trust
consensus trust
and contextual information.
6lowpan
local repair
6rlr-abc
lr-abc mechanism
multi-channel multi-radio
gravitational search algorithm.
hotspot issue
unequal clustering
multihop communication
kubernetes
containers
services
switching
computer networks important dates
availability
opportunistic
communication protocol design
adhoc on demanddistance vector alternative (odva)
open linkstaterouting (olsr)
internet ofthing(iot)
random early detection
active queue management
online password attack detection
protocol analysis
dbscan clustering algorithm
cluster formation
channel switching
delay minimization
network lifetime.
terrestial
aerial platforms
qos performance
temporary events
modbus
programmable logic controllers
network evaluation
benchmark.
mobile ipv6
fhmipv6
obs
quality of services (qos)
share-per- link (spl)
fiber delay lines (fdl)
retrial queueing.
m/bp/1system
average waiting latency
mean queueing delay.
d2d
olsr& coverage.
private blockchain networks
linear predictors
computer networks & communications cyber trust and
software systems and technologies
passive measurement
active measurement
fuzzy logic.
cloud business
cloud game
positional tracking
rendering of 3d game view.
link break
routing protocol.
android smart phone
internet of things (iots)
remote control.
vehicular ad-hoc network (vanet)
structured p2p systems
distributed hash table (dht)
collaborative learning
adaptive threshold
flooding attack
software-defined networking
uav communication
private uav network
lans of drones
signaling frames
control and feedback singling
ranging methods
range-based &range-free.
lods
uav networks
minimum number of drones
intelligent transportation system (its)
roadside unit (rsu)
urban topology
ns-2
vanetmobisim
quality of service (qos).
internet of things.
data collection
jamming detection
vehicular communications
level crossing rate
mobile communication
tetra (terrestrial trunked radio).
phishing detection
url
visual similarity
vehicular ad-hoc networks
computation offloading
vod
proxy-cache
all-cache
por-cache
random-cache
dsc-cache
sb
lf’s
lps
rfid
anomaly
energy aware routing protocol
ad-hoc multipath
particle swarm optimization algorithm
bayesian network
congestion propagation
soffttwarre deffiined nettworrkiing
qualliitty off serrviice
swiittch capaciitty
vehicle
link stability
node rank
packet delivery ratio
threshold energy
heterogeneous infrastructure as a service
open jackson network
channel model
transfer function
location-based
network operating system
nox
ces
mplste
switch capacity
number of queues impact
qoe evaluation
bandwidth isolation
mobile-rpl
adaptive link quality
low power lossy network
malqi.
packet size optimization
2-hop
time diversity
5g network
mobile core network
ip-in-ip
gre
energy harvesting
decoding sinr
uplink throughput maximization
full-duplex
self-interference
inter-cell interference
resource allocations and interference cancellation
weighted connectivity index
vehicular cloud computing
mobile edge computing
• network protocols & wireless networks
node-trustworthiness
evolutionary computing based
traffic priority
structure
sniffing
geo encryption
attribute-based
dscp marking
jitter
hfc network
mos.
binary patterns
fingerprint biometrics
histogram
neighborhood tripartite authentication.
weighted extreme learning machine
accuracy
unb iscx2012.
mobile computing
computational offloading
dynamic task offloading
energy optimization.
eehmac protocol and clustering in wsn
protocol
signcryption
elliptic curve
sd-wan
edge computing
convolution neural network.
noise modelling
bit error ratio
orthogonal frequency-division multiplexing.
mobile computing clouds
cloudlet network
mobile user
route model
connection channel
metropolitan area network
epc
network applications.
residual energ
intra wireless body sensor network (intra-wb
inter-meeting time
new network communication research articles
standalone communication systems
disaster communication systems
context-aware routing
inter-meeting time.
emergency applications
real-time packet
af cooperative
convolutional coding
path loss
power allocation
fading.
aifsn
packet delivery factor
queuing and scheduling.
index terms : cooperative systems
See more
Presentations
(12)Documents
(902)Personal Information
Occupation
Network Protocols & Wireless Networks
Industry
Technology / Software / Internet
Website
airccse.org/journal/ijcnc.html
About
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas
Tags
wireless sensor networks
routing
network security
internet of things
network protocols
security
networks wireless network
wireless sensor network
wireless networks
cloud computing
clustering
network architectures
machine learning
high speed networks
manet
iot
wsn
computer networks
computer network
network
routing protocol
qos
routing protocols
deep learning
quality of service
aodv
wireless communications
communications
load balancing
optical networking
sdn
5g
intrusion detection
ubiquitous networks
networking
networks
switching and addressing techniques
fuzzy logic
energy efficiency
ofdm
anomaly detection
blockchain
intrusion detection system
mobile networks
vanet
performance analysis
neural network
lte
authentication
6g
protocols
wireless network
localization
social network
congestion control
network lifetime
privacy
tcp
congestion
olsr
reinforcement learning
cyber security
residual energy
cluster head
feature selection
computer networks & communications
routing algorithm
cognitive radio
ids
rpl
cybersecurity
mimo
ipv6
leach
optimization
quality of service (qos)
cryptography
artificial intelligence
wireless
channel estimation
particle swarm optimization
long term evolution (lte)
network management
otfs
underwater wireless sensor networks
spectrum sensing
packet scheduling
mac
wireless lan
dsr
internet
bit error rate (ber)
wi-fi
network coding
wlan
wireless internet
steganography
handover
smart home
machine learning algorithms
voip
iot security
analytic hierarchy process
adhoc and sensor networks
resource allocation
clustering algorithm
delay
deep reinforcement learning
encryption and decryption
ensemble learning
multimedia
energy consumption
wireless sensor networks (wsns)
social networking
network protocols & wireless networks
aes
ad hoc network
mobile ad hoc network
network marketing
wireless mesh network
multipath
reliability
throughput
ipv4
wimax
vanets
attack detection
autoencoder
temperature
cognitive radio network
security effectiveness
social networks
trust
block cipher
goal question metrics
sensor node
web applications
nfv
vulnerability
energy-efficient
fog computing
multi-criteria
bittorrent
machine learning.
mobile network
apt
energy efficient
energy
mobile ad hoc networks
virus
performance evaluation
algorithm
mimo systems
authentication framework
supervised learning
healthcare
internet of things (iot)
iots
wireless sensor network (wsn)
streaming
urban area
topology
graph
web application
path planning
forward secrecy
openflow
cellular network
manets
network monitoring
cross-layer
packet loss
simulation
underwater wireless sensor net
logistic map
network on chip
lstm
distributed algorithms
actor critic
mutual authentication
contextual information
software defined networks
zigbee
topology control
q-learning
response time
graph theory
security analysis
mano
deep packet inspection
multipath fading
usability
cisco access points
adhoc
clock synchronization
wsns
cdma
information security
cognitive radio networks
satellites
compression
mobility
optimal packet length
edca
addressing techniques
communication
cross layer
next generation internet
data privacy
vehicle-to-everything
dsrc
dsdv
medium access control
humidity monitori
ibk
naivebayes
multilayer perceptron
gainratio
performance evaluation.
adjustable range load balancing protocol (albp).
chi-square
nbtree
correlation feature selection
network architecture
ultra-low latency
beyond 5g
network anomaly detection
multiple-input multiple-output
genetic algorithm.
data fusion algorithms
security.
elliptic curve cryptography
cellular mobile networks
traffic congestion
access control
ber
peer-to-peer
data mining
anomaly detection.
papr
opportunistic routing
cut-through
omega network
round robin algorithm.
waiting time
dynamic task scheduling
data aggregation.
tree-based
psnr.
virtual neighbour table
neighbour table
energy-saving application
hello interval
link change rate
hello process
cache replacement.
in-network caching
cooperative localization
extreme learning machine (elm)
border gateway protocol (bgp)
multi-path routing
key distribution
simulations
paillier cryptosystem.
eigentrust
homomorphic cryptosystem
p2p reputation management
cluster
health information management
global mobility network
communication system security
banyan networks.
hotspot traffic
uniform traffic
semi-layer multistage networks
dwt
whale optimization
mpto
monitoring.
multi-criteria decision making
filter bank
mobile
evolutionary computing
real time switching control criteria (rsw).
aomdv
awgn
mobile cloud computing
authenticated key agreement
game theory
visible light communication
wireless communication
wifi
named-data networking (ndn)
information-centric networking (icn)
scalability
scheduling
worms & trojan.
fgc
retrial
tdma
leach.
energy efficient (ee)
clustering approach
cluster heads (chs)
sound localization & wireless positioning.
otdoa
cellular networks
random waypoint model.
ml-drnn
multi-objective golden eagle o
resource-constrained network
layer depth
group signature
collective signature
digital signature authenticati
secure navigation
matlab
multiagent q-learning
radio resource management
hybrid code
two-dimensional
optical link
maximal ratio combining (mrc)
interleavers
interleave division multiple a
broadband powerline (bb-pl)
android
compressive theory
clusterhead
antennas
mse
ieee 802.11p
industrial internet
cognitive networks
leo
lorawan
snr
gps
mobile ad-hoc networks
synchronization
5g and beyond
node localization
massive connectivity
non orthogonal multiple access
software-defined networking (s
adaptive sensor sensing range (assr)
(wsn)
smart grid
sniff
rule table
firewall
store-carry-forward
direct communication
v2x communication
improved throttle algorithm.
processing time
queuing delay.
explainable ai (xai)
shapley additive explanation
non-orthogonal multiple access.
bit error rate
v2x communication.
mobility models
hesitant fuzzy linguistic term
raspberry pi
benchmark
mosquitto
mqtt
neural network.
unsw-nb15
gradient boost classifier.
fpa
custom features
unsw-b15
error minimization.
hybrid beamforming (hbf)
massive multi-input–multi-output (mmimo)
millimeter-wave (mmwave)
distributed lifetime coverage optimization protoco
adjustable range deterministic energy efficient pr
deterministic energy efficient protocol (deep)
multi user
data gathering
node degree
virtual machine.
dynamic scheduling
integer programming
makespan
rayleigh fading channels.
utilization resource prediction.
voice-assistance
intent-based networking & realtime visualization
multicore
markov chain
leach algorithm
deadline
ibleach algorithm
energy conserving
smart mobile devices
user equipment
handover decision
carrier aggregation
machine learning for iot
markov reward models
attack graph
non-homogeneous markov model
cluster distance
bce-leach
timestamp
infogain
positioning
ieec-a
ddos
bs
unsupervised learning
oee-wcrd
alamouti
quantum resistance
hello routing
next generation web architectures
isogenies
empirical evaluation
virtualization
quality of experience
internet and web applications
power control
complexity reduction
hyperelliptic curves
signal strength
unmanned aerial vehicles (uav)
efficiency
burning ship fractal
hilbert transformation
wsn.
dynamic diffusion
ieee 802.11
fintech
cw
par
masked data
channel assignment
data delivery
wormhole routing
visually image protection
ddos attack
service level agreement
pox
ryu
wireless multimedia systems
network operations & management
sdn controller
sensor networks
honey badger optimization
orchestration
multiple web access
co-channel interference
home automation
pan
live streaming
wireless body area network
cloud security
prediction
heterogeneous wireless network
infrastructure and platforms design tool for cloud
cloud application
trust score
parameter optimization.
mobility speed
deepmimo
mmwave
coordinated beamforming
mobile ad-hoc network (manet)
content distribution
self-pruning
routing in iot. packets aggregation mechanism.
high-performance iot
bloom filters
context-aware addressing
peak-to-average power ratio
continuous-time markov chain
pdr.
csma
eec
hwsn
swarm intelligence
relay node placement
iptv
diffserv
heterogeneous networks
flow label
qoe
zero trust architecture
cryptographic algorithms
lifetime
adaboosted ensemble learning
routing attack
urllc
random access
signal propagation
hybrid access scheme
field-programmable gate array (fpga).
hybrid model
switchable data dependent operation (sddo)
controlled substitution–permutation network (cspn)
interference-to-interference-plus-noiseratio
signal-to-interference-plus-noise-ratio
iot edge security
long time evolutionadvanced
multimedia etc big data tools and systems big data
bioinformatics
privacy and trust big data applications
models and algorithms big data infrastructure and
big data techniques
performance prediction
reputation
digital tokens
fuzzy logic control “flc”
cellular
ad hoc
industrial internet of things
real-world networks
attack
dynamic coin output model
consensus mechanism
traffic engineering
genetic algorithm
network topology
radio frequency attenuator
torus
radar isac
codec
sip
hexagonal
internet mobile gateway select
vehicular relay selection & ro
ad hoc networks
security culture
security awareness
botnet
spider swarm optimization
p2p botnet
communication graph
music
single-board computers
data shifting
interest selection
vehicular named data networks
anchor node
mean square error
tapped-delay line
application shimming
modeling
pruning
stepwise conditional parameter
rendezvous sequence
sensor network
neighbour attack
ns-3
post-disaster scenario
worms &trojon
high mobility
internet of medical things
anti-jamming technique
complexity
jamming attack
networks & communications
networked systems
agriculture
phishing attack
information diffusion
mpr
cluster feature vector
cellular mobile network
available bandwidth estimation
adjacent channel
co-channel
spectrum sharing
peer selection
distributed
resource management
multipath routing
ddos attacks
statistical analysis method
dynamic entropy
http
vehicular ad-hoc network
software defined network
video streaming
healthcare service
quality of service metrics
quality of experience metrics
optimal network path
data accumulation
crossover
levy flight
bluetooth low energy
mimo-ofdm
route discovery
mobile ip
algorithms
imbalance data
machin learning
ransomware
millimeter wave
range-free methods
vulnerabilities
blockchain security
information technology
hash chain
measurement
virtual routing function
deep deterministic policy grad
packet-switching networks
monitoring
asset tracking
e-content
privacy preservation
spectrum efficiencies
system capacity
content-centric networking
ray tracing
vehicular networks
fixed-grid network
multiuser precoder
phishing
dd
network bandwidth
data aggregation
software defined networking (sdn)
rdm
android malware detection
frame size optimization
edge detector
requirements
heterogeneous traffic
support vector machine
share generation
des
interactivity
lsb technique
throughput optimization
vehicle velocity
big data
neighbor density
throughput (tp)
key exchange
fbmc
fog-cloud
blowfish
malware detection
ant colony optimization
privacy protection
smart transportation system
entropy measu
correction method
adversary
arithmetic coding
energy detection
pseudonym change
dynamic authentication
internet marketing
computing
approximation
downlink mu-mimo
grpc
dataset
ad-hoc
multifactor authentication (mfa)
rest
fingerprint recognition
olsr routing
6g potential applications
web architectures
arnold map
dct
web attack
dynamic selection
node residual energy
radar sensing
iomt
quantization
tailored treatment
image compression
link quality
wban
real time traffic
filter bank multicarrier
mobile ad hoc
visual cryptography
millimeter-wave mimo systems
enhanced efficiency
route establishment
peafowl mating
iris recognition
random oversampling
data security
biometric
heterogeneous network
small-world networks
hpc clusters
ssh tunnelling
spin
maximal clique size
qualnet
clustering coefficient
csp
network graphs
assortativity index
pso
correlation
distribution
nodes
self-organizing map
information dissemination
wireless application
autism
delay rate
slotted antenna
immunization
parallel crc computation
software as a service
broadband antenna
infrastructure as a service
pts
distributed computing
and cloud compliance.
triangular microstrip antenna
substrate
energy saving
hlts
nfs
network simulator 2.
wireless sensor networks.
tcp incast
data center
ccdf
characterization
network simulation
radio propagation models
cost-minimizing algorithm
coap
m2m
distributed file system
sla
attention shift
ozo generator
intra-band contiguous
forensic system architecture
database management.
triangulation
modified largest weighted delay first (mlwdf)
confidentiality
dynamic position
tracking
zone prediction
lte-sim-5.
multipath fading.
mincuts
non-state-space model
and reliability.
attack trees
evolutionary system
integration
linear receivers
scale-free network
logarithmic rule (log-rule)
self-optimization
node- dependent
carrier aggregation (ca)
explicit loss and handoff notification
eigenvalue
small-world network
high bit error
cellular wireless network
random network
spectral radius
handoff
computer networks; minimum-cost paths tree; geneti
network stack composition
network forensics
heterogeneous networks (hetnets)
forensic analysis system
broadcast communication
mobile device
mobility load balancing
statistical methods & packet length.
life-time
matlab.
remote healthcare
device-to-device
kdd’99
mode selection
interference control
labview
kernel selection
minimum total network cost.
compuetr networks
ns2.
wireless broadband
power consumption
exponential rule (exp-rule)
nsl-kdd
rate control.
lte-advanced (lte-a)
femto-cells
deadlockfree
lyapunov exponent
split-protocol
kernel
broadcasting communication
hamiltonian model
3-d mesh topology
3-d mesh
patient monitoring
chaotic codes
lte networks
deadlock-free algorithm.
chemical networking protocols
application weight
dynamic weight
unified qos metric
radio propagation
energy efficient sensing
planning
gis
dual band
cooperative spectrum sensing
home network
hsi color space
gis layers
l*a*b color space
residential energy management
classification
lsb
mp3 data set
hiding a message
integrated system
nms
information-centric networking
rats (radio access technologies).
cba
efficiency criterion
cost analysis
web services
network address translation
noc
complexity.
health & ansprolog
lattice
logic programming
lll
lr-aided
peer selection algorithm
topology change
mobile applications
p2p live streaming
connected dominating set
virtual backbone
wavelets
digital video broadcasting
frequency selective
ricean
rayleigh
as-friendliness
owdm
qos metric
dra
opportunistic relay selection
dcs and wlan
grp
selfish nodes
manet.
performance.
zigbee & rfid.
global positioning system
improve accuracy
hierarchical hybrid edf/fifo
accuracy factors
ls
mmse
cazac sequences
cooperative communications
frft
sto
mptcp
congestion controls
multi-homed
middleware & platform
management
adaptive m-qam/mpsk modulation
orthogonal least squares ”ols”.
fuzzy basis function “fbf”
weight
non real time traffic
virtual mmachines
ims (ip multimedia subsystem)
cloud computing.
lload balancing parameters
vho (vertical handover)
visible light communications
ansf (access network selection function)
mih (media independent handover)
connectivity.
indoor communication
wireless ad hoc networks
transmission range
link distance
lightfidelity
optisystem 7.0
visibility
atmospheric attenuation
free space optical communications
hello flood attack
passive attack
active attack
key management.
vngn
vrf
cross-layer scheduling
vlan
onf
openflow and openstack
auction cluster head
packet delay
vnf
encapsulation
multi-bs
optimisation
mass balancing theorem
cloud sensor
flow networks
different service quality
multi-hop
total processing time.
multiple access points
joint multiple resource allocation
transmission power
packet reception ratio (prr)
distributed optimisation
potential game
decision making system
soc
peer-to-peer networks
distributed algorithms.
performance bounds
multimedia streaming
wireless multimedia sensor networks.
federation
access control.
identity management
federated clouds
orthogonal frequency division multiplexing.
odp polynomial
compressed sampling
sdl (specification and description language)
safety and liveness property.
validation
node monitoring protocol(nmp)
multicast
guarantee qos
adaptive service agreement
service level agreement (sla)
cloud service broker
reduction of power consumption
vertical handover (vho)
cooperative relay diversity
dynamic bandwidth distribution.
peer-to-peer (p2p)
overlay multicast tree
hybrid
smart cities
cost estimation
city services
cloud architectures
heterogeneous wireless networks
adaptive retransmission
hybrid protocols.
policy-based network management
dacs scheme
self-configuration
received signal strength indicator (rssi)
wireless sensor network (wsn).
levenberg-marquardt (lm) algorithm
user satisfaction
link cost
peer-to-peer; live streaming; internet service pro
and software fault injection & composed web servic
bandwidth allocation
fault tolerance methodologies
wi-fi.
cloud computing; cloud services; quality-of-servic
mobile cloud offloading
alternative cluster head nodes
connected candidate order
hysteresis
call admission control
mobile relay node
wireless sensors network (wsn)
media independent handover (mih)
dynamic clustering
broader gateway protocol (bgp)
energy balancing
token based coordination
security kernels
optimal cluster size
video on demand
interactivity.
authenticated data structure (ads)
adaptive modulation and coding
cross-layer design
andsf (access network discovery and selection func
web browsing & mobile networks
wifi cellular interworking
network failure tolerance.
intelligent transportation system
smart vehicle
grx (gprs roaming exchange)
ipx (ip exchange)
roaming
white label
interconnection
peering
hosted
long- reach passive optical networks; dynamic band
tora
psnr
real time traffic.
mesh-pull backup
multicast trees
resiliency technique
scalable codec
node disjoint routing
histograms of colour image
qos routing; mobile ad hoc networks; energy-aware
double stack
tcp and rtt
bgpv4
ospfv3
isp
qam & wdm.
breadth-first search tree.
sirs epidemic model
dtmc markov model
epidemic disease
approximation algorithms
greedy algorithms
sirs epidemic model
graph matching
vertex cover
simulations; mpls; traffic engineering; fast rerou
event handling
in-network aggregation
dtmc markov model
attacker
signature
virtual backbone tree
hierarchical clustering.
wormhole attack
number portability
query on release
qos routing
call dropback
onward routing.
all call query
video recording
honeypots
hypervisor
complementary cumulative dist ribution function (c
orthogonal frequency division multiplexing ( ofdm)
nids
hids
adt-android development tool.
gui-graphical user interface
ide-integrated development environment
cross-layering
inf ogain
inline measurement tcp (imtcp)
voip capacity
codec adaptation.
vowlan
smo
gsa
lkh
multimedia broadcast multicast services
dynamic rekeying
isi
fft
multi-carrier
available bandwidth
bandwidth measurement
dvb
accident.
multiplexing techniques
digital modulation formats
ieee 802.16d
sui- 4
16-qam
64-qam
sui-6.
qpsk
bpsk
sui-1
sui-2
sui-3
sui-5
adaptive colour image steganography
mobile ad hoc network (manet)
random pixel selection
collision avoidance.
difference in histograms
steganogaraphic noise
energy detection .
bam
management dynamic
alloctc
modelling
mobility management
qos management
iqmsmp
internet vulnerabilities and medical identity thef
profile of qosr
ngn
reac
cyber attacks
passive measurements
admission control
cognitive network
identity theft
hybrid-based methods.
data stores
range-based methods
node coding
resources
encoding strategy
narrowband rf networks
integrity
network computing
cloud service provider and cloud security.
binary exponential backoff.
linux.
g-rdm
mam
firewall.
projection
formal correction
eigenvalue spectrum
formal verification
misconfigurations detection
relevancy
reciprocity.
interoperability cheking
radio resource management (rrm)
proposed economic model
ufas
security component
maximum network welfare.
stream cipher
encryption oracle
mode of operation
quantum communication
phase shift keying
xbee
kdd cup 99
cluster 3.0
visualization
k-means
treeview
short message service
sms
qos routing. 1. introduction
hierarchical routing
naming mechanism; name-specifiers; predicate-based
rank revealing
qr factorization
null (noise) space
frequency estimation
time delay
signal space
subspace estimation method
security of e-content
lu factorization
root-music.
matrix decomposition
cooperative stbc
multi-media. 1. introduction
e-protection
cooperative communication
low complex sphere decoder.
outage probability
golden code
spectral efficiency
epidemic disease
system & network vir tualization
ims
resource provisioning
autonomic management
alloctc-sharing.
bandwidth allocation models (bam)
phone system
highly available
ip
telecommunications
fast handover.
hierarchical mobile ip
mipv4
mipv6
bloom filter; zfilter; zformation; diffie-hellman-
multimedia sensor networks
security of e-content
video transmission
distributed coordination function
multi-media. 1. introduction
wlan network
802.11b
fairness
e-protection
performance & 802.11p
gsm
non-deterministic delays
sensor
applications
multi carrier
multi carrier
lognormal sum
moment matching
log skew normal
amplitude clipping and filtering (acf)
elliptic filtering (ef)
iir (infinite impulse response
amplitude clipping and filtering (acf)
iir (infinite impulse response
elliptic filtering (ef)
interconnection topology
hex-cell topology
hex-cell topology
interconnection topology
dna
nist
mixcolumns
mds
power management
bottleneck energy
uwsn
fuzzy c-means
degree of freedom "dof"
matlab simulink
addressing types
802.15.4
rdp
remote desktop environments
user’s perceived operability
tesbed
fleetnet
its
queuing theory
tcp v ariants
mobility .
real time
priority of traffic flow
history routing data
bandwidth - guaranteed routing alg orithm
broadcast trees
secure clustering
dynamic clustering and data aggregation
remaining energy
coverage loss time
node lifetime
web service
maximum stability
programming models
adhoc using cisco devices.
heuristic algorithm
tcp computation enhancement
qos for routing
routing path.
eventual consistancy
wireless ad-hoc networks
smart routing.
artificial fish swarm algorithm
node clustering
peer-to-peer streaming
link prediction
dpcplp
embedding
hex-cell network
expansion
dilation
ftlr scheme
lognormal shadowing model
model unit disk graph model
directories
complex and virtual devices
representational state transfer
notch antenna
reliable hetnet
non-deterministic delays
step-size.
grid point approximation algorithm
maximizing network interruption problem
security breaking cost
mobile payment
and encryption.
distributed coordination
spectrum heterogeneity
slave
dual-slave
control channel dilemma
minimum distance spanning tree
coordinator
mobile sensor networks
sara
ant based routing
petal routing
prior storing server
internet protocol television.
video contents
passive optical network
teks
white space steganography
lzw
socioeconomic indicator s
imaginary value
phase sensitive detector method
re al value
bioimpedance
tetrapolar
chebyschev
interasterisk excha nge protocol (iax)
interworking
topology construction
topology maintenance.
enr
node classification.
erasure code
best effort
pfr
optimized edge routing
performance routing
network life
queuing delay
heterogeneous
transmission opportunity
pops virtual mobile ip network.
internet service provider
rout discovery
wavelength conversion
mobile service
mobile agents
sn mp
psd.
elliptic
energy co nsumption
ns 2.
link aware.
butterworth
application level multicast
orthogonal
multicast tree
overla y networks
multi-hop relay stations
fairness and throughput
mobile stations
sched uling
middleware
mo bile device
ifft
mobile social network
wide area network
dvb-t
traffic density
shortest path algorithm
insteon
waveins
distributed manet management
6to4 tunnel
manual tunnel
piece selection
social networking websites
peak to average power ratio (papr)
orthogonal frequency division multiplexing (ofdm)
cumulative complementary distribution function (cc
high performance computing
heterogeneous environments
parallel computing
sir model; seirs model; delay differential equatio
lte; mimo ;ofdm
dynamic spectrum access
bluetooth network
cyber threats.
jammer technology
vanet; mobility model; simulations
round trip time (rtt)
passive optical network (pon)
dynamic bandwidth allocation (dba)
ipv6 header and exhibition date.
intrusions
huffman coding
traffic matrix
point of presence
mobile ip border gateway
intrusion prevention
deauthentification
packet injection
tools
smart phone forensic
digital forensic
internal memory
digital evidence
analysis
wavelet- eigen vector
de-noising
wavelet
wavelength and converter assignment problem
eigen vectors component.
m/d/1 with vacations
mean waiting time
m/h2/1
voice control
energy management
wdm
z-wave
industrial automation
assistive homes
single carrier effect
generalized dft
papr reduction
physical unclonable function
red deer algorithm
standard-deviation based encod
variable encoding
dynamic spectrum allocation (d
single carrier-frequency divis
ws-olsr
mpr selection
wingsuit flying search
broadcast storm problem
tomek links
imbalanced data
distributed denial of service
feature extraction
tuning parameters
web usage
usage mining
http csic dataset
tomek link
5g and networks for big data
database and system security
security & ai integration
security & network management
security in remote work
cyberattack detection system
clustering techniques
3-dimension
real-time monitoring
qos metrics
orthogonal frequency division
peak to average power ratio
selective mapping
filtering and clipping
aodvmo
one-time passwor
eagle optimization
euclidean distance
electronics
information technologies
successive interference cancel
mmtc
ijcnc
computernetwork
télécommunications
bandwidth
radiation efficiency
microstrip patch antenna (mpa)
decentralized clusting
relay node.
light regions
comp
physical unc
cw.
signal to noise ratio (snr)
b
standa
dft spreading
wearable wireless sensor secur
ul-a
anti-phishing
non-content bas
network securit
blockchain technology
vanet security
internet of thing
url phishing
newcwv
bursty tcp traffic
improved reptile search algori
nature inspired computational
convergence rate
cicids-2018 dataset
system calls
ecc
data
bluetooth
low energy
wireless sensor
rateless
advertisement
congestion detection
rateless and wireless sensor
mobile wsn-iot
k-means clustering
ch selection
weight function
fnd
techniques
high-traffic networks
posterior belief
3-dimension markov chain
quasi birth-death (qbd)
retrial queueing
ad-hoc network
unlicensed band
ranging localization methods
broadcast latency problems
reachability
average latency etc
vanet-lte integration
t
mobile adhoc network
broadcast latency problems;
dynamic
security training
security management
graph-mining
secure routing
kvm
benchmarks
kernel-based virtual machines
technology
radio technology
secure system
wearable wireless sensor
fifth-generation radio technol
forwarding probability
connectivity metric.
unmanned aerial vehicles
internet of everything
channel modelling
propagation model
fifth generation.
qlrp
qltpc.
iov
deep convolutional neural learning
protection motivation theory
fear motivation
digital native
digital immigrant
information privacy
antivirus.
machine authentication
cryptography.
knuth shuffle method
image encryption
parallel processing
digital communication
pulse position modulation.
big data security
microstrip patch antenna
design optimization
ultra-wideband.
hpv vaccination
gini index
locality awareness
replication.
cooperative systems
rayleigh fading channels
case studies
failure probability
sensor lifetime
subsets
classification model
random forest
k-nearest neighbors
naive bayes.
algorithms and applications bioinformatics compute
transmit power.
transmit power
biogeography based optimization
optimal route
vehicular ad hoc network
visible light communication.
ims & mipv6
greedy algorithm
mmpp
ims & mipv6.
greedy algorithm.
mmpp.
traffic shaping
nfv.
broadcasting
flooding
neighbour coverage
delay sensitive
packet capture
packet capture.
raspberry
cognitive radio resource
dos attack
rf energy transfer
multiplicative interleaving wi
sac-ocdma systems
nzcc code
md code
spectral/spatial dimension (sd
humidity monitoring systems
energy reservation
environmental monitoring
signing group
multiplicative interleaving
tree algorithm (mita)
network protocols & wireless n
machine learning attack
xor-puf
one-time password
security routing protocol
quality-of-service (qos).
successive interference
wireless sensor networks (wsn)
sensor nodes (sns)
anchor nodes (ans)
rof-based radio access network
long-te
income inequality
rstudio
american adolescents
multiscale analysis
multilayer representation
graph signal processing
truncated mean
clock time duration.
mfo
stable & vanet.
context-aware architecture
probabilistic voting-based filtering
false positive attack
false negative attack
network security.
extended clas
elliptic curve encryption.
sumo.
data accuracy.
sumo
data accuracy
qos.
threshold based vm placement technique for load ba
virtual machine
aodv routing protocol
aodv routing protocol.
privacy.
security and privacy for iot iot-enabled innovatio
delay sensitive.
adhoc networks
framed slotted aloha
aloha-q
transmission probability
etx
routing metric
objective functions
clipping
threshold
estimation
eigen decomposition
improved elliptic curve
rnn
packet classification
handover authentication
lightweight hashing
ant-colony algorithm
harris hawk algorithm
improved elliptic curve crypto
distributed system
asynchronous clocking
conflict resolution
race condition
k-framework
language semantics
pccl
automation
post-quantum cryptography
e ciency gains
fintrust blockchain framework
link’s fineness
spatial relation
ns3 simulator
navigation systems
neural networks
innovation
wireless internet'
network operations
cooperative radio
hard fusion rule
additive white gaussian noise
non-cooperative wideb
spectrum sensin
cooperative wideb
movable anchor
priority scheduling
data packet
mobile agent
itinerary planning
smote
network security laboratory
shortest -path algorithms
entropy
mechanization
navigation
sensor errors
low-cost inertial navigation
system
scopusindexed
scopuspublication
conflict flows
online active learning
rerouting
queue congestion
military areas
multi-hop free space optics
malaga turbulence
pointing errors
qam
multi-hop wsn
clustering routing
rdmsca-levy
energy hole
voronoi cell
node repositioning
metaheuristic algorithms
delay optimization
hyperparameter tuning
security protocols
key agreement
cyber physical system
zero-day attack prediction
hybrid game theory
transfer learning
resnet50
ann-ae
cnn-lstm
bi-lstm
ensemble neural networks
olfoa
quality of service(qos)
transmission delay
latency
post-quantum cryptography;
eciency gains
fintrust
blockchain framework
personal data security
cybersecurity framework
e-governance
data protection
regulations
secure digital identity
variational autoencoder
bler
shortest path
source node
target node
virtual mimo
esso
network traffic classification
netml dataset
ai-driven
uav
3d mapping
iot-enabled sensors
modified proportional topology
enhanced seeker search optimi
multi-layer deep recurrent neu
windows
shimming
radio network
spatioconstraints
mayfly optimization
delay efficiency
nsl-kdd dataset
kyoto dataset
two stage detection
mean detection time
architectural styles
orchestration and rest
resource utilization
multipoint relay
topology maintenance
message control
architectural
cloud
isolation forest
local outlier factor
smart designated node
intrusion detection systems
dimensionality reduction
multi-server security
cryptanalysis
fuzzy commitment
sdwn
nonlinear programming
macstrategy
high performance
queuing dela
intelligent transportation sys
salp swarm algorithm
multi objective optimization
stable election protocol
contact tracing
covid-19
confidence interval
lightweight environment
smart contract security
os pen testing
exploit windows
persistence attack
mininet wi-fi
association control
access point selection
software-defined wireless net
content dissemination
content forwarding
network performance
spatio-constraints
cognitive radio network (crn)
intelligent systems
software process
web engineering
l software engineering
software maintenance
knowledge-based systems
formal methods
testing
federated learning
threat
mcdm
mitre
nantar algorithm
machine learning techniques
cse-cic-ids 2018
litnet-2020
reactive
rwp
reinforcement learning-based r
automatic
cognitiveradio
deeplearning
mask r-cnn
instancesegmentation
direct-to-satellites
inertial navigation systems
ins errors
convolutional neural networks
packet drop
end-to-end delay
best-effort network topology
eniao
fish school search routing
duty cycling
wsn optimization
adaptive hybrid deep learning
mprs selection
flow classification
architectures
wireless multimedia
mac strategy
traffic index
traffic sensing systems
ifog-simulator
mish
cnn-bigru
hogzilla dataset
sha-1
message digest
data integrity
digital signature
national security agency
cluster-based routing protocol
low-power and lossy networks
position information response
position information request p
pdr
eecrpsid
non-interactive zero-knowledge
radio networks
mobile marketing
radar
software development
software
software testing
per
differential privacy
elastic optical network
cloud applications
software-defined network
traffic flows
virtual data center
artificial bee colony (abc)
fuzzy logic system.
autonomous underwater vehicle
mission planning
heterogeneous group routing
evolutionary algorithm
encryption
mpi
supercomputer
attributed hierarchical graphs
big graphs
information visualization
visualization systems
secret sharing
lightweight cryptography
public key cryptography
fuzzy classifier
differential evolution
binary harmonic search
akaike information criterion
distributed leader election
internet gateway discovery
server
lan security
lanenforcer
mobile adhoc networks (manets)
dynamic source routing (dsr)
preemptive routing
synchronization process
packet communications
asynchronous data stream
discrete information
channels with a random multiple access
program modeling
control flow
petri nets
composition operations
multi-commodity multi-cost flow
linear-programming
divide and conquer (d&c)
divide and conquer quad tree based multi hop stati
energy efficient routing protocol (eerp)
energy efficient wsns (eewsns).
response surface methodology
and modeling
design of experiments
minimum total network cost
fuzzy system
firefly algorithm
ieee 802.11af
ieee 802.11e
white-fi.
path splitting
virtual optical network
virtual network embedding
deterministic channels
network performances
mobile ad-hoc networks (manet)
self-organized networks (son)
ring
mcr
static routing algorithm
dynamic fault-tolerant routing.
lighting control
dimming
acoustic
underwater wireless device networks
void region
and normalized depth.
lightweight encryption
simeck
bandwidth optimization
energy consumption (ec)
efficient reliability and interval discrepant rout
average delay (ad)
execution time (et)
and bandwidth utilization (bu).
communication networks
data center network
flow scheduling
network partition
stochastic scheduling model
software defined networking
real-time online interactive application
roia
ips
security hardware
multi-core processor
configuration model
multiple displays
pervasive display
content
user engagement.
multiple input multiple output(mimo)
orthogonal frequency division multiplexing(ofdm)
peak to average power ratio(papr). space time bloc
homomorphic encryption
elliptic curve cryptography (ecc)
elliptic curve digital signature algorithm (ecdsa)
honest-but-curious attack
malicious attac
pmipv6
aaa
fast handov
processing time.
housekeeper
robot
human
tasks.
data security and privacy for cps
wireless sensor network security and privacy
multimedia traffic
routing.
single path
recursive least squares (rls) algorithm
energy-aware
ad-hoc networks
power consumption.
is-is
ospf
route redistribution
igrp
eigrp
multicommodity flow
ciphertext
sac
s-box
secure algorithm
avalanche effect
advanced encryption standard
client/server
mobile agent .
contact center
communication channel
p2p communication
webrct
802.11ad
deep neural networks
joint multiple resourceallocation
cloud computing environments
position accuracy
error rate
carrier interference
average carrier power
oma
preemption
interconnection networks
network services
octagon-cell
interconnected networks
received power
code
electromagnetic radiation
power density
equipment spectrum analyzer.
global system for mobile communications (gsm)
radiation pattern
pgb
agf
fading channel
dirty paper coding
viterbi algorithm.
lattice encoding and decoding
indoor positioning
localisation
smart homes
internet of things & rfid
audio and video transmission
adaptive bitrate streaming
progressive download
global positioning system gps
forgetting factor (λ)
ota carrier
interference
grid
cell-head election& void-handling algorithm.
knowledge science
flow of knowledge
velocity of knowledge
social sciences.
traffic model
processor sharing
network measurements
insensitive fuzzy c-means
stable election protocol(sep)
sepinsensitive fuzzy c-means.
sensitive persons
electromagnetic radiation (emr)
emr exposure level
signalling protocol
network auto-configuration.
cloud robotics
openstack
apache
ros.
transmission energy
simulation analysis.
network attack
dark-net monitoring
topology map
adjacency matrix
laplacian matrix
total accessibility matrix
random channel
detection
priority-based data reporting
ieee 802.15.4 sensor networks
queue management
transport protocol
wsn testbed
congestion control.
home monitoring
has.
adhoc wireless networks
adhoc routing
event condition action (eca)
fat-tailedness
kurtosis
centrality metrics
degree distribution
concordance
opportunistic fair scheduling (ofs)
zero-forcing beamforming (zfb)
channel capacity
lte downlink
spate time block coding and throughput.
adaptive routing
disjoint paths
3d grid
data-oriented privacy
secure data aggregation
spread spectrum.
uwsns
nemo
diffserv.
mcs
opportunistic networks
smart city
virtual machine migration
vertical compression
horizontal compression
data reliability
path selection
confidence
priority
fuzzy optimization.
virtual cache
virtual wan accelerator
content delivery services
minimum network cost
black-hole attack
discrete trust
consensus trust
and contextual information.
6lowpan
local repair
6rlr-abc
lr-abc mechanism
multi-channel multi-radio
gravitational search algorithm.
hotspot issue
unequal clustering
multihop communication
kubernetes
containers
services
switching
computer networks important dates
availability
opportunistic
communication protocol design
adhoc on demanddistance vector alternative (odva)
open linkstaterouting (olsr)
internet ofthing(iot)
random early detection
active queue management
online password attack detection
protocol analysis
dbscan clustering algorithm
cluster formation
channel switching
delay minimization
network lifetime.
terrestial
aerial platforms
qos performance
temporary events
modbus
programmable logic controllers
network evaluation
benchmark.
mobile ipv6
fhmipv6
obs
quality of services (qos)
share-per- link (spl)
fiber delay lines (fdl)
retrial queueing.
m/bp/1system
average waiting latency
mean queueing delay.
d2d
olsr& coverage.
private blockchain networks
linear predictors
computer networks & communications cyber trust and
software systems and technologies
passive measurement
active measurement
fuzzy logic.
cloud business
cloud game
positional tracking
rendering of 3d game view.
link break
routing protocol.
android smart phone
internet of things (iots)
remote control.
vehicular ad-hoc network (vanet)
structured p2p systems
distributed hash table (dht)
collaborative learning
adaptive threshold
flooding attack
software-defined networking
uav communication
private uav network
lans of drones
signaling frames
control and feedback singling
ranging methods
range-based &range-free.
lods
uav networks
minimum number of drones
intelligent transportation system (its)
roadside unit (rsu)
urban topology
ns-2
vanetmobisim
quality of service (qos).
internet of things.
data collection
jamming detection
vehicular communications
level crossing rate
mobile communication
tetra (terrestrial trunked radio).
phishing detection
url
visual similarity
vehicular ad-hoc networks
computation offloading
vod
proxy-cache
all-cache
por-cache
random-cache
dsc-cache
sb
lf’s
lps
rfid
anomaly
energy aware routing protocol
ad-hoc multipath
particle swarm optimization algorithm
bayesian network
congestion propagation
soffttwarre deffiined nettworrkiing
qualliitty off serrviice
swiittch capaciitty
vehicle
link stability
node rank
packet delivery ratio
threshold energy
heterogeneous infrastructure as a service
open jackson network
channel model
transfer function
location-based
network operating system
nox
ces
mplste
switch capacity
number of queues impact
qoe evaluation
bandwidth isolation
mobile-rpl
adaptive link quality
low power lossy network
malqi.
packet size optimization
2-hop
time diversity
5g network
mobile core network
ip-in-ip
gre
energy harvesting
decoding sinr
uplink throughput maximization
full-duplex
self-interference
inter-cell interference
resource allocations and interference cancellation
weighted connectivity index
vehicular cloud computing
mobile edge computing
• network protocols & wireless networks
node-trustworthiness
evolutionary computing based
traffic priority
structure
sniffing
geo encryption
attribute-based
dscp marking
jitter
hfc network
mos.
binary patterns
fingerprint biometrics
histogram
neighborhood tripartite authentication.
weighted extreme learning machine
accuracy
unb iscx2012.
mobile computing
computational offloading
dynamic task offloading
energy optimization.
eehmac protocol and clustering in wsn
protocol
signcryption
elliptic curve
sd-wan
edge computing
convolution neural network.
noise modelling
bit error ratio
orthogonal frequency-division multiplexing.
mobile computing clouds
cloudlet network
mobile user
route model
connection channel
metropolitan area network
epc
network applications.
residual energ
intra wireless body sensor network (intra-wb
inter-meeting time
new network communication research articles
standalone communication systems
disaster communication systems
context-aware routing
inter-meeting time.
emergency applications
real-time packet
af cooperative
convolutional coding
path loss
power allocation
fading.
aifsn
packet delivery factor
queuing and scheduling.
index terms : cooperative systems
See more