wireless sensor networks routing network security internet of things network protocols security networks wireless network wireless sensor network wireless networks cloud computing clustering network architectures machine learning high speed networks manet iot wsn computer networks computer network network routing protocol qos routing protocols deep learning quality of service aodv wireless communications communications load balancing optical networking sdn 5g intrusion detection ubiquitous networks networking networks switching and addressing techniques fuzzy logic energy efficiency ofdm anomaly detection blockchain intrusion detection system mobile networks vanet performance analysis neural network lte authentication 6g protocols wireless network localization social network congestion control network lifetime privacy tcp congestion olsr reinforcement learning cyber security residual energy cluster head feature selection computer networks & communications routing algorithm cognitive radio ids rpl cybersecurity mimo ipv6 leach optimization quality of service (qos) cryptography artificial intelligence wireless channel estimation particle swarm optimization long term evolution (lte) network management otfs underwater wireless sensor networks spectrum sensing packet scheduling mac wireless lan dsr internet bit error rate (ber) wi-fi network coding wlan wireless internet steganography handover smart home machine learning algorithms voip iot security analytic hierarchy process adhoc and sensor networks resource allocation clustering algorithm delay deep reinforcement learning encryption and decryption ensemble learning multimedia energy consumption wireless sensor networks (wsns) social networking network protocols & wireless networks aes ad hoc network mobile ad hoc network network marketing wireless mesh network multipath reliability throughput ipv4 wimax vanets attack detection autoencoder temperature cognitive radio network security effectiveness social networks trust block cipher goal question metrics sensor node web applications nfv vulnerability energy-efficient fog computing multi-criteria bittorrent machine learning. mobile network apt energy efficient energy mobile ad hoc networks virus performance evaluation algorithm mimo systems authentication framework supervised learning healthcare internet of things (iot) iots wireless sensor network (wsn) streaming urban area topology graph web application path planning forward secrecy openflow cellular network manets network monitoring cross-layer packet loss simulation underwater wireless sensor net logistic map network on chip lstm distributed algorithms actor critic mutual authentication contextual information software defined networks zigbee topology control q-learning response time graph theory security analysis mano deep packet inspection multipath fading usability cisco access points adhoc clock synchronization wsns cdma information security cognitive radio networks satellites compression mobility optimal packet length edca addressing techniques communication cross layer next generation internet data privacy vehicle-to-everything dsrc dsdv medium access control humidity monitori ibk naivebayes multilayer perceptron gainratio performance evaluation. adjustable range load balancing protocol (albp). chi-square nbtree correlation feature selection network architecture ultra-low latency beyond 5g network anomaly detection multiple-input multiple-output genetic algorithm. data fusion algorithms security. elliptic curve cryptography cellular mobile networks traffic congestion access control ber peer-to-peer data mining anomaly detection. papr opportunistic routing cut-through omega network round robin algorithm. waiting time dynamic task scheduling data aggregation. tree-based psnr. virtual neighbour table neighbour table energy-saving application hello interval link change rate hello process cache replacement. in-network caching cooperative localization extreme learning machine (elm) border gateway protocol (bgp) multi-path routing key distribution simulations paillier cryptosystem. eigentrust homomorphic cryptosystem p2p reputation management cluster health information management global mobility network communication system security banyan networks. hotspot traffic uniform traffic semi-layer multistage networks dwt whale optimization mpto monitoring. multi-criteria decision making filter bank mobile evolutionary computing real time switching control criteria (rsw). aomdv awgn mobile cloud computing authenticated key agreement game theory visible light communication wireless communication wifi named-data networking (ndn) information-centric networking (icn) scalability scheduling worms & trojan. fgc retrial tdma leach. energy efficient (ee) clustering approach cluster heads (chs) sound localization & wireless positioning. otdoa cellular networks random waypoint model. ml-drnn multi-objective golden eagle o resource-constrained network layer depth group signature collective signature digital signature authenticati secure navigation matlab multiagent q-learning radio resource management hybrid code two-dimensional optical link maximal ratio combining (mrc) interleavers interleave division multiple a broadband powerline (bb-pl) android compressive theory clusterhead antennas mse ieee 802.11p industrial internet cognitive networks leo lorawan snr gps mobile ad-hoc networks synchronization 5g and beyond node localization massive connectivity non orthogonal multiple access software-defined networking (s adaptive sensor sensing range (assr) (wsn) smart grid sniff rule table firewall store-carry-forward direct communication v2x communication improved throttle algorithm. processing time queuing delay. explainable ai (xai) shapley additive explanation non-orthogonal multiple access. bit error rate v2x communication. mobility models hesitant fuzzy linguistic term raspberry pi benchmark mosquitto mqtt neural network. unsw-nb15 gradient boost classifier. fpa custom features unsw-b15 error minimization. hybrid beamforming (hbf) massive multi-input–multi-output (mmimo) millimeter-wave (mmwave) distributed lifetime coverage optimization protoco adjustable range deterministic energy efficient pr deterministic energy efficient protocol (deep) multi user data gathering node degree virtual machine. dynamic scheduling integer programming makespan rayleigh fading channels. utilization resource prediction. voice-assistance intent-based networking & realtime visualization multicore markov chain leach algorithm deadline ibleach algorithm energy conserving smart mobile devices user equipment handover decision carrier aggregation machine learning for iot markov reward models attack graph non-homogeneous markov model cluster distance bce-leach timestamp infogain positioning ieec-a ddos bs unsupervised learning oee-wcrd alamouti quantum resistance hello routing next generation web architectures isogenies empirical evaluation virtualization quality of experience internet and web applications power control complexity reduction hyperelliptic curves signal strength unmanned aerial vehicles (uav) efficiency burning ship fractal hilbert transformation wsn. dynamic diffusion ieee 802.11 fintech cw par masked data channel assignment data delivery wormhole routing visually image protection ddos attack service level agreement pox ryu wireless multimedia systems network operations & management sdn controller sensor networks honey badger optimization orchestration multiple web access co-channel interference home automation pan live streaming wireless body area network cloud security prediction heterogeneous wireless network infrastructure and platforms design tool for cloud cloud application trust score parameter optimization. mobility speed deepmimo mmwave coordinated beamforming mobile ad-hoc network (manet) content distribution self-pruning routing in iot. packets aggregation mechanism. high-performance iot bloom filters context-aware addressing peak-to-average power ratio continuous-time markov chain pdr. csma eec hwsn swarm intelligence relay node placement iptv diffserv heterogeneous networks flow label qoe zero trust architecture cryptographic algorithms lifetime adaboosted ensemble learning routing attack urllc random access signal propagation hybrid access scheme field-programmable gate array (fpga). hybrid model switchable data dependent operation (sddo) controlled substitution–permutation network (cspn) interference-to-interference-plus-noiseratio signal-to-interference-plus-noise-ratio iot edge security long time evolutionadvanced multimedia etc big data tools and systems big data bioinformatics privacy and trust big data applications models and algorithms big data infrastructure and big data techniques performance prediction reputation digital tokens fuzzy logic control “flc” cellular ad hoc industrial internet of things real-world networks attack dynamic coin output model consensus mechanism traffic engineering genetic algorithm network topology radio frequency attenuator torus radar isac codec sip hexagonal internet mobile gateway select vehicular relay selection & ro ad hoc networks security culture security awareness botnet spider swarm optimization p2p botnet communication graph music single-board computers data shifting interest selection vehicular named data networks anchor node mean square error tapped-delay line application shimming modeling pruning stepwise conditional parameter rendezvous sequence sensor network neighbour attack ns-3 post-disaster scenario worms &trojon high mobility internet of medical things anti-jamming technique complexity jamming attack networks & communications networked systems agriculture phishing attack information diffusion mpr cluster feature vector cellular mobile network available bandwidth estimation adjacent channel co-channel spectrum sharing peer selection distributed resource management multipath routing ddos attacks statistical analysis method dynamic entropy http vehicular ad-hoc network software defined network video streaming healthcare service quality of service metrics quality of experience metrics optimal network path data accumulation crossover levy flight bluetooth low energy mimo-ofdm route discovery mobile ip algorithms imbalance data machin learning ransomware millimeter wave range-free methods vulnerabilities blockchain security information technology hash chain measurement virtual routing function deep deterministic policy grad packet-switching networks monitoring asset tracking e-content privacy preservation spectrum efficiencies system capacity content-centric networking ray tracing vehicular networks fixed-grid network multiuser precoder phishing dd network bandwidth data aggregation software defined networking (sdn) rdm android malware detection frame size optimization edge detector requirements heterogeneous traffic support vector machine share generation des interactivity lsb technique throughput optimization vehicle velocity big data neighbor density throughput (tp) key exchange fbmc fog-cloud blowfish malware detection ant colony optimization privacy protection smart transportation system entropy measu correction method adversary arithmetic coding energy detection pseudonym change dynamic authentication internet marketing computing approximation downlink mu-mimo grpc dataset ad-hoc multifactor authentication (mfa) rest fingerprint recognition olsr routing 6g potential applications web architectures arnold map dct web attack dynamic selection node residual energy radar sensing iomt quantization tailored treatment image compression link quality wban real time traffic filter bank multicarrier mobile ad hoc visual cryptography millimeter-wave mimo systems enhanced efficiency route establishment peafowl mating iris recognition random oversampling data security biometric heterogeneous network small-world networks hpc clusters ssh tunnelling spin maximal clique size qualnet clustering coefficient csp network graphs assortativity index pso correlation distribution nodes self-organizing map information dissemination wireless application autism delay rate slotted antenna immunization parallel crc computation software as a service broadband antenna infrastructure as a service pts distributed computing and cloud compliance. triangular microstrip antenna substrate energy saving hlts nfs network simulator 2. wireless sensor networks. tcp incast data center ccdf characterization network simulation radio propagation models cost-minimizing algorithm coap m2m distributed file system sla attention shift ozo generator intra-band contiguous forensic system architecture database management. triangulation modified largest weighted delay first (mlwdf) confidentiality dynamic position tracking zone prediction lte-sim-5. multipath fading. mincuts non-state-space model and reliability. attack trees evolutionary system integration linear receivers scale-free network logarithmic rule (log-rule) self-optimization node- dependent carrier aggregation (ca) explicit loss and handoff notification eigenvalue small-world network high bit error cellular wireless network random network spectral radius handoff computer networks; minimum-cost paths tree; geneti network stack composition network forensics heterogeneous networks (hetnets) forensic analysis system broadcast communication mobile device mobility load balancing statistical methods & packet length. life-time matlab. remote healthcare device-to-device kdd’99 mode selection interference control labview kernel selection minimum total network cost. compuetr networks ns2. wireless broadband power consumption exponential rule (exp-rule) nsl-kdd rate control. lte-advanced (lte-a) femto-cells deadlockfree lyapunov exponent split-protocol kernel broadcasting communication hamiltonian model 3-d mesh topology 3-d mesh patient monitoring chaotic codes lte networks deadlock-free algorithm. chemical networking protocols application weight dynamic weight unified qos metric radio propagation energy efficient sensing planning gis dual band cooperative spectrum sensing home network hsi color space gis layers l*a*b color space residential energy management classification lsb mp3 data set hiding a message integrated system nms information-centric networking rats (radio access technologies). cba efficiency criterion cost analysis web services network address translation noc complexity. health & ansprolog lattice logic programming lll lr-aided peer selection algorithm topology change mobile applications p2p live streaming connected dominating set virtual backbone wavelets digital video broadcasting frequency selective ricean rayleigh as-friendliness owdm qos metric dra opportunistic relay selection dcs and wlan grp selfish nodes manet. performance. zigbee & rfid. global positioning system improve accuracy hierarchical hybrid edf/fifo accuracy factors ls mmse cazac sequences cooperative communications frft sto mptcp congestion controls multi-homed middleware & platform management adaptive m-qam/mpsk modulation orthogonal least squares ”ols”. fuzzy basis function “fbf” weight non real time traffic virtual mmachines ims (ip multimedia subsystem) cloud computing. lload balancing parameters vho (vertical handover) visible light communications ansf (access network selection function) mih (media independent handover) connectivity. indoor communication wireless ad hoc networks transmission range link distance lightfidelity optisystem 7.0 visibility atmospheric attenuation free space optical communications hello flood attack passive attack active attack key management. vngn vrf cross-layer scheduling vlan onf openflow and openstack auction cluster head packet delay vnf encapsulation multi-bs optimisation mass balancing theorem cloud sensor flow networks different service quality multi-hop total processing time. multiple access points joint multiple resource allocation transmission power packet reception ratio (prr) distributed optimisation potential game decision making system soc peer-to-peer networks distributed algorithms. performance bounds multimedia streaming wireless multimedia sensor networks. federation access control. identity management federated clouds orthogonal frequency division multiplexing. odp polynomial compressed sampling sdl (specification and description language) safety and liveness property. validation node monitoring protocol(nmp) multicast guarantee qos adaptive service agreement service level agreement (sla) cloud service broker reduction of power consumption vertical handover (vho) cooperative relay diversity dynamic bandwidth distribution. peer-to-peer (p2p) overlay multicast tree hybrid smart cities cost estimation city services cloud architectures heterogeneous wireless networks adaptive retransmission hybrid protocols. policy-based network management dacs scheme self-configuration received signal strength indicator (rssi) wireless sensor network (wsn). levenberg-marquardt (lm) algorithm user satisfaction link cost peer-to-peer; live streaming; internet service pro and software fault injection & composed web servic bandwidth allocation fault tolerance methodologies wi-fi. cloud computing; cloud services; quality-of-servic mobile cloud offloading alternative cluster head nodes connected candidate order hysteresis call admission control mobile relay node wireless sensors network (wsn) media independent handover (mih) dynamic clustering broader gateway protocol (bgp) energy balancing token based coordination security kernels optimal cluster size video on demand interactivity. authenticated data structure (ads) adaptive modulation and coding cross-layer design andsf (access network discovery and selection func web browsing & mobile networks wifi cellular interworking network failure tolerance. intelligent transportation system smart vehicle grx (gprs roaming exchange) ipx (ip exchange) roaming white label interconnection peering hosted long- reach passive optical networks; dynamic band tora psnr real time traffic. mesh-pull backup multicast trees resiliency technique scalable codec node disjoint routing histograms of colour image qos routing; mobile ad hoc networks; energy-aware double stack tcp and rtt bgpv4 ospfv3 isp qam & wdm. breadth-first search tree. sirs epidemic model dtmc markov model epidemic disease approximation algorithms greedy algorithms sirs epidemic model graph matching vertex cover simulations; mpls; traffic engineering; fast rerou event handling in-network aggregation dtmc markov model attacker signature virtual backbone tree hierarchical clustering. wormhole attack number portability query on release qos routing call dropback onward routing. all call query video recording honeypots hypervisor complementary cumulative dist ribution function (c orthogonal frequency division multiplexing ( ofdm) nids hids adt-android development tool. gui-graphical user interface ide-integrated development environment cross-layering inf ogain inline measurement tcp (imtcp) voip capacity codec adaptation. vowlan smo gsa lkh multimedia broadcast multicast services dynamic rekeying isi fft multi-carrier available bandwidth bandwidth measurement dvb accident. multiplexing techniques digital modulation formats ieee 802.16d sui- 4 16-qam 64-qam sui-6. qpsk bpsk sui-1 sui-2 sui-3 sui-5 adaptive colour image steganography mobile ad hoc network (manet) random pixel selection collision avoidance. difference in histograms steganogaraphic noise energy detection . bam management dynamic alloctc modelling mobility management qos management iqmsmp internet vulnerabilities and medical identity thef profile of qosr ngn reac cyber attacks passive measurements admission control cognitive network identity theft hybrid-based methods. data stores range-based methods node coding resources encoding strategy narrowband rf networks integrity network computing cloud service provider and cloud security. binary exponential backoff. linux. g-rdm mam firewall. projection formal correction eigenvalue spectrum formal verification misconfigurations detection relevancy reciprocity. interoperability cheking radio resource management (rrm) proposed economic model ufas security component maximum network welfare. stream cipher encryption oracle mode of operation quantum communication phase shift keying xbee kdd cup 99 cluster 3.0 visualization k-means treeview short message service sms qos routing. 1. introduction hierarchical routing naming mechanism; name-specifiers; predicate-based rank revealing qr factorization null (noise) space frequency estimation time delay signal space subspace estimation method security of e-content lu factorization root-music. matrix decomposition cooperative stbc multi-media. 1. introduction e-protection cooperative communication low complex sphere decoder. outage probability golden code spectral efficiency epidemic disease system & network vir tualization ims resource provisioning autonomic management alloctc-sharing. bandwidth allocation models (bam) phone system highly available ip telecommunications fast handover. hierarchical mobile ip mipv4 mipv6 bloom filter; zfilter; zformation; diffie-hellman- multimedia sensor networks security of e-content video transmission distributed coordination function multi-media. 1. introduction wlan network 802.11b fairness e-protection performance & 802.11p gsm non-deterministic delays sensor applications multi carrier multi carrier lognormal sum moment matching log skew normal amplitude clipping and filtering (acf) elliptic filtering (ef) iir (infinite impulse response amplitude clipping and filtering (acf) iir (infinite impulse response elliptic filtering (ef) interconnection topology hex-cell topology hex-cell topology interconnection topology dna nist mixcolumns mds power management bottleneck energy uwsn fuzzy c-means degree of freedom "dof" matlab simulink addressing types 802.15.4 rdp remote desktop environments user’s perceived operability tesbed fleetnet its queuing theory tcp v ariants mobility . real time priority of traffic flow history routing data bandwidth - guaranteed routing alg orithm broadcast trees secure clustering dynamic clustering and data aggregation remaining energy coverage loss time node lifetime web service maximum stability programming models adhoc using cisco devices. heuristic algorithm tcp computation enhancement qos for routing routing path. eventual consistancy wireless ad-hoc networks smart routing. artificial fish swarm algorithm node clustering peer-to-peer streaming link prediction dpcplp  embedding hex-cell network expansion dilation ftlr scheme lognormal shadowing model model unit disk graph model directories complex and virtual devices representational state transfer notch antenna reliable hetnet non-deterministic delays step-size. grid point approximation algorithm maximizing network interruption problem security breaking cost mobile payment and encryption. distributed coordination spectrum heterogeneity slave dual-slave control channel dilemma minimum distance spanning tree coordinator mobile sensor networks sara ant based routing petal routing prior storing server internet protocol television. video contents passive optical network teks white space steganography lzw socioeconomic indicator s imaginary value phase sensitive detector method re al value bioimpedance tetrapolar chebyschev interasterisk excha nge protocol (iax) interworking topology construction topology maintenance. enr node classification. erasure code best effort pfr optimized edge routing performance routing network life queuing delay heterogeneous transmission opportunity pops virtual mobile ip network. internet service provider rout discovery wavelength conversion mobile service mobile agents sn mp psd. elliptic energy co nsumption ns 2. link aware. butterworth application level multicast orthogonal multicast tree overla y networks multi-hop relay stations fairness and throughput mobile stations sched uling middleware mo bile device ifft mobile social network wide area network dvb-t traffic density shortest path algorithm insteon waveins distributed manet management 6to4 tunnel manual tunnel piece selection social networking websites peak to average power ratio (papr) orthogonal frequency division multiplexing (ofdm) cumulative complementary distribution function (cc high performance computing heterogeneous environments parallel computing sir model; seirs model; delay differential equatio lte; mimo ;ofdm dynamic spectrum access bluetooth network cyber threats. jammer technology vanet; mobility model; simulations round trip time (rtt) passive optical network (pon) dynamic bandwidth allocation (dba) ipv6 header and exhibition date. intrusions huffman coding traffic matrix point of presence mobile ip border gateway intrusion prevention deauthentification packet injection tools smart phone forensic digital forensic internal memory digital evidence analysis wavelet- eigen vector de-noising wavelet wavelength and converter assignment problem eigen vectors component. m/d/1 with vacations mean waiting time m/h2/1 voice control energy management wdm z-wave industrial automation assistive homes single carrier effect generalized dft papr reduction physical unclonable function red deer algorithm standard-deviation based encod variable encoding dynamic spectrum allocation (d single carrier-frequency divis ws-olsr mpr selection wingsuit flying search broadcast storm problem tomek links imbalanced data distributed denial of service feature extraction tuning parameters web usage usage mining http csic dataset tomek link 5g and networks for big data database and system security security & ai integration security & network management security in remote work cyberattack detection system clustering techniques 3-dimension real-time monitoring qos metrics orthogonal frequency division peak to average power ratio selective mapping filtering and clipping aodvmo one-time passwor eagle optimization euclidean distance electronics information technologies successive interference cancel mmtc ijcnc computernetwork télécommunications bandwidth radiation efficiency microstrip patch antenna (mpa) decentralized clusting relay node. light regions comp physical unc cw. signal to noise ratio (snr) b standa dft spreading wearable wireless sensor secur ul-a anti-phishing non-content bas network securit blockchain technology vanet security internet of thing url phishing newcwv bursty tcp traffic improved reptile search algori nature inspired computational convergence rate cicids-2018 dataset system calls ecc data bluetooth low energy wireless sensor rateless advertisement congestion detection rateless and wireless sensor mobile wsn-iot k-means clustering ch selection weight function fnd techniques high-traffic networks posterior belief 3-dimension markov chain quasi birth-death (qbd) retrial queueing ad-hoc network unlicensed band ranging localization methods broadcast latency problems reachability average latency etc vanet-lte integration t mobile adhoc network broadcast latency problems; dynamic security training security management graph-mining secure routing kvm benchmarks kernel-based virtual machines technology radio technology secure system wearable wireless sensor fifth-generation radio technol forwarding probability connectivity metric. unmanned aerial vehicles internet of everything channel modelling propagation model fifth generation. qlrp qltpc. iov deep convolutional neural learning protection motivation theory fear motivation digital native digital immigrant information privacy antivirus. machine authentication cryptography. knuth shuffle method image encryption parallel processing digital communication pulse position modulation. big data security microstrip patch antenna design optimization ultra-wideband. hpv vaccination gini index locality awareness replication. cooperative systems rayleigh fading channels case studies failure probability sensor lifetime subsets classification model random forest k-nearest neighbors naive bayes. algorithms and applications bioinformatics compute transmit power. transmit power biogeography based optimization optimal route vehicular ad hoc network visible light communication. ims & mipv6 greedy algorithm mmpp ims & mipv6. greedy algorithm. mmpp. traffic shaping nfv. broadcasting flooding neighbour coverage delay sensitive packet capture packet capture. raspberry cognitive radio resource dos attack rf energy transfer multiplicative interleaving wi sac-ocdma systems nzcc code md code spectral/spatial dimension (sd humidity monitoring systems energy reservation environmental monitoring signing group multiplicative interleaving tree algorithm (mita) network protocols & wireless n machine learning attack xor-puf one-time password security routing protocol quality-of-service (qos). successive interference wireless sensor networks (wsn) sensor nodes (sns) anchor nodes (ans) rof-based radio access network long-te income inequality rstudio american adolescents multiscale analysis multilayer representation graph signal processing truncated mean clock time duration. mfo stable & vanet. context-aware architecture probabilistic voting-based filtering false positive attack false negative attack network security. extended clas elliptic curve encryption. sumo. data accuracy. sumo data accuracy qos. threshold based vm placement technique for load ba virtual machine aodv routing protocol aodv routing protocol. privacy. security and privacy for iot iot-enabled innovatio delay sensitive. adhoc networks framed slotted aloha aloha-q transmission probability etx routing metric objective functions clipping threshold estimation eigen decomposition improved elliptic curve rnn packet classification handover authentication lightweight hashing ant-colony algorithm harris hawk algorithm improved elliptic curve crypto distributed system asynchronous clocking conflict resolution race condition k-framework language semantics pccl automation post-quantum cryptography e ciency gains fintrust blockchain framework link’s fineness spatial relation ns3 simulator navigation systems neural networks innovation wireless internet' network operations cooperative radio hard fusion rule additive white gaussian noise non-cooperative wideb spectrum sensin cooperative wideb movable anchor priority scheduling data packet mobile agent itinerary planning smote network security laboratory shortest -path algorithms entropy mechanization navigation sensor errors low-cost inertial navigation system scopusindexed scopuspublication conflict flows online active learning rerouting queue congestion military areas multi-hop free space optics malaga turbulence pointing errors qam multi-hop wsn clustering routing rdmsca-levy energy hole voronoi cell node repositioning metaheuristic algorithms delay optimization hyperparameter tuning security protocols key agreement cyber physical system zero-day attack prediction hybrid game theory transfer learning resnet50 ann-ae cnn-lstm bi-lstm ensemble neural networks olfoa quality of service(qos) transmission delay latency post-quantum cryptography; eciency gains fintrust blockchain framework personal data security cybersecurity framework e-governance data protection regulations secure digital identity variational autoencoder bler shortest path source node target node virtual mimo esso network traffic classification netml dataset ai-driven uav 3d mapping iot-enabled sensors modified proportional topology enhanced seeker search optimi multi-layer deep recurrent neu windows shimming radio network spatioconstraints mayfly optimization delay efficiency nsl-kdd dataset kyoto dataset two stage detection mean detection time architectural styles orchestration and rest resource utilization multipoint relay topology maintenance message control architectural cloud isolation forest local outlier factor smart designated node intrusion detection systems dimensionality reduction multi-server security cryptanalysis fuzzy commitment sdwn nonlinear programming macstrategy high performance queuing dela intelligent transportation sys salp swarm algorithm multi objective optimization stable election protocol contact tracing covid-19 confidence interval lightweight environment smart contract security os pen testing exploit windows persistence attack mininet wi-fi association control access point selection software-defined wireless net content dissemination content forwarding network performance spatio-constraints cognitive radio network (crn) intelligent systems software process web engineering l software engineering software maintenance knowledge-based systems formal methods testing federated learning threat mcdm mitre nantar algorithm machine learning techniques cse-cic-ids 2018 litnet-2020 reactive rwp reinforcement learning-based r automatic cognitiveradio deeplearning mask r-cnn instancesegmentation direct-to-satellites inertial navigation systems ins errors convolutional neural networks packet drop end-to-end delay best-effort network topology eniao fish school search routing duty cycling wsn optimization adaptive hybrid deep learning mprs selection flow classification architectures wireless multimedia mac strategy traffic index traffic sensing systems ifog-simulator mish cnn-bigru hogzilla dataset sha-1 message digest data integrity digital signature national security agency cluster-based routing protocol low-power and lossy networks position information response position information request p pdr eecrpsid non-interactive zero-knowledge radio networks mobile marketing radar software development software software testing per differential privacy elastic optical network cloud applications software-defined network traffic flows virtual data center artificial bee colony (abc) fuzzy logic system. autonomous underwater vehicle mission planning heterogeneous group routing evolutionary algorithm encryption mpi supercomputer attributed hierarchical graphs big graphs information visualization visualization systems secret sharing lightweight cryptography public key cryptography fuzzy classifier differential evolution binary harmonic search akaike information criterion distributed leader election internet gateway discovery server lan security lanenforcer mobile adhoc networks (manets) dynamic source routing (dsr) preemptive routing synchronization process packet communications asynchronous data stream discrete information channels with a random multiple access program modeling control flow petri nets composition operations multi-commodity multi-cost flow linear-programming divide and conquer (d&c) divide and conquer quad tree based multi hop stati energy efficient routing protocol (eerp) energy efficient wsns (eewsns). response surface methodology and modeling design of experiments minimum total network cost fuzzy system firefly algorithm ieee 802.11af ieee 802.11e white-fi. path splitting virtual optical network virtual network embedding deterministic channels network performances mobile ad-hoc networks (manet) self-organized networks (son) ring mcr static routing algorithm dynamic fault-tolerant routing. lighting control dimming acoustic underwater wireless device networks void region and normalized depth. lightweight encryption simeck bandwidth optimization energy consumption (ec) efficient reliability and interval discrepant rout average delay (ad) execution time (et) and bandwidth utilization (bu). communication networks data center network flow scheduling network partition stochastic scheduling model software defined networking real-time online interactive application roia ips security hardware multi-core processor configuration model multiple displays pervasive display content user engagement. multiple input multiple output(mimo) orthogonal frequency division multiplexing(ofdm) peak to average power ratio(papr). space time bloc homomorphic encryption elliptic curve cryptography (ecc) elliptic curve digital signature algorithm (ecdsa) honest-but-curious attack malicious attac pmipv6 aaa fast handov processing time. housekeeper robot human tasks. data security and privacy for cps wireless sensor network security and privacy multimedia traffic routing. single path recursive least squares (rls) algorithm energy-aware ad-hoc networks power consumption. is-is ospf route redistribution igrp eigrp multicommodity flow ciphertext sac s-box secure algorithm avalanche effect advanced encryption standard client/server mobile agent . contact center communication channel p2p communication webrct 802.11ad deep neural networks joint multiple resourceallocation cloud computing environments position accuracy error rate carrier interference average carrier power oma preemption interconnection networks network services octagon-cell interconnected networks received power code electromagnetic radiation power density equipment spectrum analyzer. global system for mobile communications (gsm) radiation pattern pgb agf fading channel dirty paper coding viterbi algorithm. lattice encoding and decoding indoor positioning localisation smart homes internet of things & rfid audio and video transmission adaptive bitrate streaming progressive download global positioning system gps forgetting factor (λ) ota carrier interference grid cell-head election& void-handling algorithm. knowledge science flow of knowledge velocity of knowledge social sciences. traffic model processor sharing network measurements insensitive fuzzy c-means stable election protocol(sep) sepinsensitive fuzzy c-means. sensitive persons electromagnetic radiation (emr) emr exposure level signalling protocol network auto-configuration. cloud robotics openstack apache ros. transmission energy simulation analysis. network attack dark-net monitoring topology map adjacency matrix laplacian matrix total accessibility matrix random channel detection priority-based data reporting ieee 802.15.4 sensor networks queue management transport protocol wsn testbed congestion control. home monitoring has. adhoc wireless networks adhoc routing event condition action (eca) fat-tailedness kurtosis centrality metrics degree distribution concordance opportunistic fair scheduling (ofs) zero-forcing beamforming (zfb) channel capacity lte downlink spate time block coding and throughput. adaptive routing disjoint paths 3d grid data-oriented privacy secure data aggregation spread spectrum. uwsns nemo diffserv. mcs opportunistic networks smart city virtual machine migration vertical compression horizontal compression data reliability path selection confidence priority fuzzy optimization. virtual cache virtual wan accelerator content delivery services minimum network cost black-hole attack discrete trust consensus trust and contextual information. 6lowpan local repair 6rlr-abc lr-abc mechanism multi-channel multi-radio gravitational search algorithm. hotspot issue unequal clustering multihop communication kubernetes containers services switching computer networks important dates availability opportunistic communication protocol design adhoc on demanddistance vector alternative (odva) open linkstaterouting (olsr) internet ofthing(iot) random early detection active queue management online password attack detection protocol analysis dbscan clustering algorithm cluster formation channel switching delay minimization network lifetime. terrestial aerial platforms qos performance temporary events modbus programmable logic controllers network evaluation benchmark. mobile ipv6 fhmipv6 obs quality of services (qos) share-per- link (spl) fiber delay lines (fdl) retrial queueing. m/bp/1system average waiting latency mean queueing delay. d2d olsr& coverage. private blockchain networks linear predictors computer networks & communications cyber trust and software systems and technologies passive measurement active measurement fuzzy logic. cloud business cloud game positional tracking rendering of 3d game view. link break routing protocol. android smart phone internet of things (iots) remote control. vehicular ad-hoc network (vanet) structured p2p systems distributed hash table (dht) collaborative learning adaptive threshold flooding attack software-defined networking uav communication private uav network lans of drones signaling frames control and feedback singling ranging methods range-based &range-free. lods uav networks minimum number of drones intelligent transportation system (its) roadside unit (rsu) urban topology ns-2 vanetmobisim quality of service (qos). internet of things. data collection jamming detection vehicular communications level crossing rate mobile communication tetra (terrestrial trunked radio). phishing detection url visual similarity vehicular ad-hoc networks computation offloading vod proxy-cache all-cache por-cache random-cache dsc-cache sb lf’s lps rfid anomaly energy aware routing protocol ad-hoc multipath particle swarm optimization algorithm bayesian network congestion propagation soffttwarre deffiined nettworrkiing qualliitty off serrviice swiittch capaciitty vehicle link stability node rank packet delivery ratio threshold energy heterogeneous infrastructure as a service open jackson network channel model transfer function location-based network operating system nox ces mplste switch capacity number of queues impact qoe evaluation bandwidth isolation mobile-rpl adaptive link quality low power lossy network malqi. packet size optimization 2-hop time diversity 5g network mobile core network ip-in-ip gre energy harvesting decoding sinr uplink throughput maximization full-duplex self-interference inter-cell interference resource allocations and interference cancellation weighted connectivity index vehicular cloud computing mobile edge computing • network protocols & wireless networks node-trustworthiness evolutionary computing based traffic priority structure sniffing geo encryption attribute-based dscp marking jitter hfc network mos. binary patterns fingerprint biometrics histogram neighborhood tripartite authentication. weighted extreme learning machine accuracy unb iscx2012. mobile computing computational offloading dynamic task offloading energy optimization. eehmac protocol and clustering in wsn protocol signcryption elliptic curve sd-wan edge computing convolution neural network. noise modelling bit error ratio orthogonal frequency-division multiplexing. mobile computing clouds cloudlet network mobile user route model connection channel metropolitan area network epc network applications. residual energ intra wireless body sensor network (intra-wb inter-meeting time new network communication research articles standalone communication systems disaster communication systems context-aware routing inter-meeting time. emergency applications real-time packet af cooperative convolutional coding path loss power allocation fading. aifsn packet delivery factor queuing and scheduling. index terms : cooperative systems
Ver más