default search action
Journal of Network and Computer Applications, Volume 128
Volume 128, February 2019
- Salah-Eddine Belouanas, Kim Loan Thai, Prométhée Spathis, Marcelo Dias de Amorim:
Mobility-assisted offloading in centrally-coordinated cellular networks. 1-10
- Lingling Xu, Jin Li, Xiaofeng Chen, Wanhua Li, Shaohua Tang, Hao-Tian Wu:
Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things. 11-20 - Haomiao Yang, Xiaofen Wang, Chun Yang, Xin Cong, You Zhang:
Securing content-centric networks with content-based encryption. 21-32 - Nour Moustafa, Jiankun Hu, Jill Slay:
A holistic review of Network Anomaly Detection Systems: A comprehensive survey. 33-55 - Wenjuan Li, Weizhi Meng, Zhiyuan Tan, Yang Xiang:
Design of multi-view based email classification for IoT systems via semi-supervised learning. 56-63 - Mainak Adhikari, Sudarshan Nandy, Tarachand Amgoth:
Meta heuristic-based task deployment mechanism for load balancing in IaaS cloud. 64-77 - Helder M. N. S. Oliveira, Nelson L. S. da Fonseca:
Routing, spectrum and core assignment algorithms for protection of space division multiplexing elastic optical networks. 78-89 - Aparna Kumari, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Reza M. Parizi, Kim-Kwang Raymond Choo:
Fog data analytics: A taxonomy and process model. 90-104 - Hanan Elazhary:
Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions. 105-140
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.