1 | -- | 19 | Huaying Yin, Hongmei Yang, Saeid Shahmoradi. EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks |
21 | -- | 0 | Huaying Yin, Hongmei Yang, Saeid Shahmoradi. Correction to: EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks |
23 | -- | 39 | Pooja Chaudhary, Brij B. Gupta, Awadhesh Kumar Singh. Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks |
41 | -- | 52 | Ming Lei, Bin Yu, Xingjun Zhang, Scott Fowler, Bocheng Yu, Peng Wang. Joint power control and user scheduling for backbone-assisted industrial wireless networks with successive interference cancellation |
53 | -- | 66 | Fatemeh Zardosht, Mostafa Derakhtian, Ali Jamshidi 0001, Hossein Eshaghi. Recognition and elimination of SSDF attackers in cognitive radio networks |
67 | -- | 81 | Maryam Chinipardaz, Seyed Majid Noorhosseini, Ahmad Sarlak. Inter-cell interference in multi-tier heterogeneous cellular networks: modeling and constraints |
83 | -- | 98 | Akber Ali Khan, Vinod Kumar, Jangirala Srinivas, Saru Kumari, Mridul Kumar Gupta. RAKS: robust authentication and key agreement scheme for satellite infrastructure |
99 | -- | 114 | Dengao Li, Yongxin Wen, Shuang Xu, Qiang Wang, Ruiqin Bai, JuMin Zhao. EDChannel: channel prediction of backscatter communication network based on encoder-decoder |
115 | -- | 123 | Ming Zhao, ZhiPeng Liu, Ling Zhao. Finite field construction for quasi-cyclic LDPC convolutional codes with cyclic 2-D MDS codes |
125 | -- | 173 | Palak Bagga, Ashok Kumar Das, Vinay Chamola, Mohsen Guizani. Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions |