2058 | -- | 2063 | Dusit Tao Niyato. IEEE Communications Surveys and Tutorials |
2064 | -- | 2097 | Yang Xiao, Jun Liu 0014, Jiawei Wu, Nirwan Ansari. Leveraging Deep Reinforcement Learning for Traffic Engineering: A Survey |
2098 | -- | 2130 | Feras M. Awaysheh, Mamoun Alazab, Sahil Garg, Dusit Niyato, Christos V. Verikoukis. Big Data Resource Management & Networks: Taxonomy, Survey, and Future Directions |
2131 | -- | 2165 | Quyuan Luo, Shihong Hu, Changle Li, Guanghui Li 0001, Weisong Shi. Resource Scheduling in Edge Computing: A Survey |
2166 | -- | 2190 | Milad Ghaznavi, Elaheh Jalalpour, Mohammad A. Salahuddin, Raouf Boutaba, Daniel Migault, Stere Preda. Content Delivery Network Security: A Survey |
2191 | -- | 2217 | Kaifeng Yue, Yuanyuan Zhang, Yanru Chen, Yang Li, Lian Zhao, Chunming Rong, Liangyin Chen. A Survey of Decentralizing Applications via Blockchain: The 5G and Beyond Perspective |
2218 | -- | 2247 | Amoldeep Singh, Kapal Dev, Harun Siljak, Hem Dutt Joshi, Maurizio Magarini. Quantum Internet - Applications, Functionalities, Enabling Technologies, Challenges, and Research Directions |
2248 | -- | 2294 | Mauro Conti, Denis Donadel, Federico Turrin. A Survey on Industrial Control System Testbeds and Datasets for Security Research |
2295 | -- | 2323 | Anne Josiane Kouam, Aline Carneiro Viana, Alain Tchana. SIMBox Bypass Frauds in Cellular Networks: Strategies, Evolution, Detection, and Future Directions |
2324 | -- | 2350 | Ishan Karunanayake, Nadeem Ahmed, Robert A. Malaney, Rafiqul Islam, Sanjay K. Jha. De-Anonymisation Attacks on Tor: A Survey |
2351 | -- | 2383 | Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac. A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems |
2384 | -- | 2428 | Van Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin. Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges |
2429 | -- | 2459 | Giovanni Schmid. Thirty Years of DNS Insecurity: Current Issues and Perspectives |
2460 | -- | 2493 | Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles A. Kamhoua, Munindar P. Singh. A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning |
2494 | -- | 2524 | Zahra Pooranian, Mauro Conti, Hamed Haddadi, Rahim Tafazolli. Online Advertising Security: Issues, Taxonomy, and Future Directions |
2525 | -- | 2556 | Daniel Schlette, Marco Caselli, Günther Pernul. A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective |
2557 | -- | 2589 | José Santos 0001, Tim Wauters, Bruno Volckaert, Filip De Turck. Towards Low-Latency Service Delivery in a Continuum of Virtual Resources: State-of-the-Art and Research Directions |
2590 | -- | 2629 | Balázs Sonkoly, János Czentye, Márk Szalay, Balázs Németh, László Toka. Survey on Placement Methods in the Edge and Beyond |
2630 | -- | 2659 | Peter Adam Hoeher, Jan Sticklus, Andrej Harlakin. Underwater Optical Wireless Communications in Swarm Robotics: A Tutorial |
2660 | -- | 2710 | Zemin Sun, Yanheng Liu, Jian Wang 0003, Guofa Li, Carie Anil, Keqiang Li, Xinyu Guo, Geng Sun, Daxin Tian, Dongpu Cao. Applications of Game Theory in Vehicular Networks: A Survey |
2711 | -- | 2752 | Ashfaq Ahmed, Arafat Al-Dweik, Youssef Iraqi, Husameldin Mukhtar, Muhammad Naeem 0001, Ekram Hossain. Hybrid Automatic Repeat Request (HARQ) in Wireless Communications Systems and Standards: A Contemporary Survey |
2753 | -- | 2801 | Xiao Lu 0001, Mohammad Salehi, Martin Haenggi, Ekram Hossain, Hai Jiang 0001. Stochastic Geometry Analysis of Spatial-Temporal Performance in Wireless Networks: A Tutorial |
2802 | -- | 2832 | Vikas Hassija, Vinay Chamola, Adhar Agrawal, Adit Goyal, Nguyen Cong Luong, Dusit Niyato, Fei Richard Yu, Mohsen Guizani. Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey |
2833 | -- | 2884 | Aygün Baltaci, Ergin Dinc, Mustafa Ozger, Abdulrahman Alabbasi, Cicek Cavdar, Dominic Schupke. A Survey of Wireless Networks for Future Aerial Communications (FACOM) |