143 | -- | 154 | Sahar Said, Waleed Saad, Mona Shokair, Sayed El-Araby. On the performance of double resolution ADC receivers for massive MIMO relaying systems |
155 | -- | 169 | Ayoub Bahnasse, Mohamed Talea, Abdelmajid Badri, Fatima Ezzahraa Louhab, Sara Laafar. Smart hybrid SDN approach for MPLS VPN management on digital environment |
171 | -- | 182 | Ramtin Ranji, Ali Mohammed Mansoor, Asmiza Abdul Sani. EEDOS: an energy-efficient and delay-aware offloading scheme based on device to device collaboration in mobile edge computing |
183 | -- | 188 | Yee-Loo Foo. A spectrum sharing model that counters eavesdropping |
189 | -- | 203 | Fatma A. Al Emam, Mohamed E. Nasr, Sherif E. Kishk. Collaborative cross-layer framework for handover decision in overlay networks |
205 | -- | 221 | Salman A. AlQahtani, Waseem A. Alhomiqani. A multi-stage analysis of network slicing architecture for 5G mobile networks |
223 | -- | 239 | Abdul Basit 0004, Saad B. Qaisar, Mudassar Ali, Muhammad Naeem 0001, Marc Bruyere, Joel J. P. C. Rodrigues. Interconnecting networks with optimized service provisioning |
241 | -- | 257 | Beomsu Kim, Bongsoo Roh, Jae-Hyun Ham, Ki-Il Kim. Extended OLSR and AODV based on multi-criteria decision making method |
259 | -- | 288 | Raúl Riesco, Xavier Larriva-Novo, Víctor A. Villagrá. Cybersecurity threat intelligence knowledge exchange based on blockchain |
289 | -- | 311 | Mohammed Wael Baidas, Emad Alsusa, Motassim Al-Farra, Mubarak Al-Mubarak. Multi-relay selection in energy-harvesting cooperative wireless networks: game-theoretic modeling and analysis |
313 | -- | 315 | Mohammed Wael Baidas, Emad Alsusa, Motassim Al-Farra, Mubarak Al-Mubarak. Correction to: Multi-relay selection in energy-harvesting cooperative wireless networks: game-theoretic modeling and analysis |
317 | -- | 348 | Mohamed Amine Ferrag, Leandros A. Maglaras, Abdelouahid Derhab, Helge Janicke. Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues |