| 1 | -- | 9 | Ying-Dar Lin. Editorial: First Quarter 2019 IEEE Communications Surveys and Tutorials |
| 10 | -- | 27 | Danping He, Bo Ai, Ke Guan, Longhe Wang, Zhangdui Zhong, Thomas Kürner. The Design and Applications of High-Performance Ray-Tracing Simulation Platform for 5G and Beyond Wireless Communications: A Tutorial |
| 28 | -- | 65 | Fadi Al-Turjman, Enver Ever, Hadi Zahmatkesh. Small Cells in the Forthcoming 5G/IoT: Traffic Modelling and Deployment Overview |
| 66 | -- | 87 | Jiguang He, Valtteri Tervo, Xiaobo Zhou 0003, Xin He, Shen Qian, Meng Cheng, Markku J. Juntti, Tad Matsumoto. A Tutorial on Lossy Forwarding Cooperative Relaying |
| 88 | -- | 145 | Ahmed Nasrallah, Akhilesh S. Thyagaturu, Ziyad Alharbi, Cui-Xiang Wang, Xing Shao, Martin Reisslein, Hesham Elbakoury. Ultra-Low Latency (ULL) Networks: The IEEE TSN and IETF DetNet Standards and Related 5G ULL Research |
| 146 | -- | 172 | Line M. P. Larsen, Aleksandra Checko, Henrik Lehrmann Christiansen. A Survey of the Functional Splits Proposed for 5G Mobile Crosshaul Networks |
| 173 | -- | 196 | Marco Giordani, Michele Polese, Arnab Roy, Douglas Castor, Michele Zorzi. A Tutorial on Beam Management for 3GPP NR at mmWave Frequencies |
| 197 | -- | 216 | Evgeny M. Khorov, Anton Kiryanov, Andrey I. Lyakhov, Giuseppe Bianchi 0001. A Tutorial on IEEE 802.11ax High Efficiency WLANs |
| 217 | -- | 237 | Tengfei Chang, Thomas Watteyne, Xavier Vilajosana, Pedro Henrique Gomes. Constructive Interference in 802.15.4: A Tutorial |
| 238 | -- | 259 | Faroq A. Awin, Esam Abdel-Raheem, Kemal Tepe. Blind Spectrum Sensing Approaches for Interweaved Cognitive Radio System: A Tutorial and Short Course |
| 260 | -- | 288 | Jose Moura, David Hutchison. Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends |
| 289 | -- | 314 | Benjamin Baron, Prométhée Spathis, Marcelo Dias de Amorim, Yannis Viniotis, Mostafa H. Ammar. Mobility as an Alternative Communication Channel: A Survey |
| 315 | -- | 348 | Tianqi Mao, Qi Wang 0002, Zhaocheng Wang 0001, Sheng Chen 0001. Novel Index Modulation Techniques: A Survey |
| 349 | -- | 392 | Yinbo Yu, Xing Li, Xue Leng, Libin Song, Kai Bu, Yan Chen 0004, Jianfeng Yang, Liang Zhang, Kang Cheng, Xin Xiao. Fault Management in Software-Defined Networking: A Survey |
| 393 | -- | 430 | Jun-feng Xie, F. Richard Yu, Tao Huang 0005, Renchao Xie, Jiang Liu 0010, Chen-meng Wang, Yunjie Liu. A Survey of Machine Learning Techniques Applied to Software Defined Networking (SDN): Research Issues and Challenges |
| 431 | -- | 463 | Behnam Dezfouli, Vahid Esmaeelzadeh, Jaykumar Sheth, Marjan Radi. A Review of Software-Defined WLANs: Architectures and Central Control Mechanisms |
| 464 | -- | 486 | Zahraa N. Abdullah, Imtiaz Ahmad, Iftekhar Hussain. Segment Routing in Software Defined Networks: A Survey |
| 487 | -- | 507 | Hajar Hantouti, Nabil Benamar, Tarik Taleb, Abdelquoddouss Laghrissi. Traffic Steering for Service Function Chaining |
| 508 | -- | 525 | Beakcheol Jang, Hyunjung Kim. Indoor Positioning Technologies Without Offline Fingerprinting Map: A Survey |
| 526 | -- | 561 | Stephan Kleber, Lisa Maile, Frank Kargl. Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis |
| 562 | -- | 585 | Abdelhak Bentaleb, Bayan Taani, Ali C. Begen, Christian Timmerer, Roger Zimmermann. A Survey on Bitrate Adaptation Schemes for Streaming Media Over HTTP |
| 586 | -- | 618 | Xuyang Jing, Zheng Yan 0002, Witold Pedrycz. Security Data Collection and Data Analytics in the Internet: A Survey |
| 619 | -- | 639 | Anna Volkova, Michael Niedermeier, Robert Basmadjian, Hermann de Meer. Security Challenges in Control Network Protocols: A Survey |
| 640 | -- | 660 | Martin Husák, Jana Komárková, Elias Bou-Harb, Pavel Celeda. Survey of Attack Projection, Prediction, and Forecasting in Cyber Security |
| 661 | -- | 685 | Amit Praseed, P. Santhi Thilagam. DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications |
| 686 | -- | 728 | Preeti Mishra, Vijay Varadharajan, Udaya Kiran Tupakula, Emmanuel S. Pilli. A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection |
| 729 | -- | 752 | Shengming Jiang. On Securing Underwater Acoustic Networks: A Survey |
| 753 | -- | 778 | Tao Wang, Zhigao Zheng, Mubashir Husain Rehmani, Shihong Yao, Zheng Huo. Privacy Preservation in Big Data From the Communication Perspective - A Survey |
| 779 | -- | 811 | Rens Wouter van der Heijden, Stefan Dietzel, Tim Leinmüller, Frank Kargl. Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems |
| 812 | -- | 837 | Ivan Farris, Tarik Taleb, Yacine Khettab, JaeSeung Song. A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems |
| 838 | -- | 857 | Till Neudecker, Hannes Hartenstein. Network Layer Aspects of Permissionless Blockchains |
| 858 | -- | 880 | Tara Salman, Maede Zolanvari, Aiman Erbad, Raj Jain, Mohammed Samaka. Security Services Using Blockchains: A State of the Art Survey |
| 881 | -- | 919 | Nedasadat Hosseinidehaj, Zunaira Babar, Robert A. Malaney, Soon Xin Ng, Lajos Hanzo. Satellite-Based Continuous-Variable Quantum Communications: State-of-the-Art and a Predictive Outlook |
| 920 | -- | 939 | Roberto M. Oliveira, Alex Borges Vieira, Haniph A. Latchman, Moisés Vidal Ribeiro. Medium Access Control Protocols for Power Line Communication: A Survey |
| 940 | -- | 969 | YaHui Li, Xia Yin, Zhiliang Wang, Jiangyuan Yao, Xingang Shi, Jianping Wu, Han Zhang, Qing Wang. A Survey on Network Verification and Testing With Formal Methods: Approaches and Challenges |
| 970 | -- | 1010 | Zunaira Babar, Daryus Chandra, Hung Viet Nguyen, Panagiotis Botsinis, Dimitrios Alanis, Soon Xin Ng, Lajos Hanzo. Duality of Quantum and Classical Error Correction Codes: Design Principles and Examples |