Abstract is missing.
- 5G and the Future of Security in ICTDavid Soldani. 1-8 [doi]
- Decoding Latency of LDPC Codes in 5G NRHao Wu 0009, Huayong Wang. 1-5 [doi]
- Performance Analysis of Random Backoff based D2D Discovery in Cellular NetworksZhongyang Yu, Boon-Chong Seet. 1-6 [doi]
- Link Scheduling for Data Collection in SIC-Capable UAV NetworksYawen Zheng, Kwan-Wu Chin. 1-6 [doi]
- SDN-based Wireless Access Networks Utilising BBR TCP Congestion ControlHoang Do, Mark A. Gregory, Shuo Li. 1-8 [doi]
- Performance Analysis of Clustering Algorithms for Content-Sharing Based D2D Enabled 5G NetworksSaad Aslam, Fakhrul Alam, Syed Faraz Hasan, Mohammad Rashid. 1-7 [doi]
- Device to Device Collaboration Architecture for Real- Time Identification of User and Abnormal Activities in HomeSeong Su Keum, Cheol Hwan Lee, Soon-Ju Kang. 1-3 [doi]
- Outdoor Signal Performance of LoRaWAN Technology for Campus-Scale IoT ConnectivityRais Rizal Yunus, Husna Zainol Abidin, Fadhlan Hafizhelmi Kamaru Zaman, Syahrul Afzal Che Abdullah. 1-6 [doi]
- A Novel Entitlement-based Blockchain-enabled Security Architecture for IoTFariza Sabrina. 1-7 [doi]
- Adaptive Control of Nonstatistical Sensor Data Aggregation to Minimize Latency in IoT GatewaysHideaki Yoshino, Kenko Ota, Takefumi Hiraguri. 1-6 [doi]
- Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT NetworksJames Jin Kang, Kiran Fahd, Sitalakshmi Venkatraman, Rolando Trujillo-Rasua, Paul S. Haskell-Dowland. 1-6 [doi]
- Download Traffic Scheduling for CubeSats Swarms with Inter-Satellite LinksYawen Zheng, Kwan-Wu Chin, Luyao Wang. 1-6 [doi]
- Green Multi-Stage Upgrade for Bundled-Link SDNs with Budget ConstraintLely Hiryanto, Sieteng Soh, Kwan-Wu Chin, Mihai M. Lazarescu. 1-7 [doi]
- Feature Selection: Multi-source and Multi-view Data Limitations, Capabilities and PotentialsMarianne Cherrington, Joan Lu, David Airehrour, Fadi A. Thabtah, Qiang Xu 0002, Samaneh Madanian. 1-6 [doi]
- Steganalysis of Storage-based Covert Channels Using EntropyJun O. Seo, Sathiamoorthy Manoharan, Ulrich Speidel. 1-6 [doi]
- Dynamic Resource Allocation for Visible Light Communications (VLC)- WiFi Heterogeneous SystemsLiwei Yang, Wenjie Zhang, Lining Deng, Junning Zhang. 1-6 [doi]
- Realization of congestion-aware energy-aware virtual link embeddingMinh Pham, Doan B. Hoang, Zenon Chaczko. 1-6 [doi]
- Utilising SDN to Counter BGP Convergence DelaysHamad Alotaibi, Shuo Li, Mark A. Gregory. 1-6 [doi]
- Detecting IRC-based Botnets by Network Traffic Analysis Through Machine LearningXue Jun Li, Maode Ma, Yi Lin Yen. 1-6 [doi]
- Improvised MANET Selfish Node Detection using Artificial Immune System based Decision TreeLincy Elizebeth Jim, Mark A. Gregory. 1-6 [doi]
- A Method for Comparing OpenFlow and P4Paul Zanna, Pj Radcliffe, Karina Gomez Chavez. 1-3 [doi]
- A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR CodesYong Jin, Masahiko Tomoishi. 1-7 [doi]
- Detecting Compromised Switches And Middlebox-Bypass Attacks In Service Function ChainingNguyen Canh Thang, Minho Park. 1-6 [doi]
- A Cloud-Based Traffic Flow Framework for Tactile Internet using SDN and Fog ComputingVaibhav Fanibhare, Nurul I. Sarkar, Adnan Al-Anbuky. 1-6 [doi]
- Music Response Based on Real-time Facial Expression RecognitionDailun Chiang, JihHsiang Yang, Ziyuan Huang, Feipei Lai. 1-3 [doi]
- Compact Multiband Frequency Reconfigurable Antenna for 5G CommunicationsAdnan Ghaffar, Xue Jun Li, Boon-Chong Seet, Wahaj Abbas Awan, Niamat Hussain. 1-3 [doi]
- Leveraging CNN and Transfer Learning for Vision-based Human Activity RecognitionSamundra Deep, Xi Zheng. 1-4 [doi]
- Digital Forensic Readiness In Wireless Medical SystemsAr Kar Kyaw, Brian Cusack, Raymond Lutui. 1-6 [doi]
- Mininet Topology: Mirror of the Optical Switch FabricSadia Qureshi, Robin Braun. 1-6 [doi]
- The Inference Graph of Cybersecurity RulesDawood Sheniar, Nabeel Hadaad, Ron Addie. 1-6 [doi]
- Supercomputer Networks in the Datacenter: Benchmarking the Evolution of Communication Granularity from Macroscale down to NanoscaleFiras Al-Ali, Thilina Doremure Gamage, Hewa W. T. S. Nanayakkara, Farhad Mehdipour, Sayan Kumar Ray. 1-6 [doi]
- Non-Centralised and Non-GPS Navigation Mechanism using IoT sensors: challenges and trade-offsDebraj Basu 0002, Xiang Gui, Yi Zhang, Avishek Nag. 1-6 [doi]
- Design and Implementation of Wi-Fi Based Attendance System Using Raspberry PiArchana Banepali, Rajan Kadel, Deepani B. Guruge, Sharly Joana Halder. 1-6 [doi]
- Demystifying LoRa WAN Security and CapacityMichael Santamaria, Alan Marchiori. 1-7 [doi]
- Unsplittable flow Edge Load factor Balancing in SDN using P4 RuntimeEiichiro Kawaguchi, Hikaru Kasuga, Norihiko Shinomiya. 1-6 [doi]
- Performance Analysis of Defused VLC Channel for Mobile EnvironmentShakir Ullah, Saeed-ur Rehman, Peter Hoon Joon Chong. 1-6 [doi]
- Evaluating TCP Connection HealthinessNils Rodday, Raphael Labaca Castro, Klement Streit, Gabi Dreo Rodosek. 1-4 [doi]
- Ambient Intelligence for Smart Home using The Internet of ThingsHakilo Sabit, Peter Han Joo Chong, Jeff Kilby. 1-3 [doi]
- Rate Matching Pattern EstimationByoungjo Choi, Stevan Berber. 1-3 [doi]
- Hierarchical Architecture for Computational Offloading in Autonomous Vehicle EnvironmentArslan Rasheed, Asim Anwar, Arun Kumar 0006, Peter Han Joo Chong, Xue Jun Li. 1-6 [doi]
- Development of a Supply Chain Product Monitoring NetworkDarryn Wells, Fakhrul Alam, Yi Chen, Robert Abbel, Kate Parker. 1-4 [doi]
- Analysis of Staircase Power Distributions for Reduced Number of Power Levels for 5G Planar Array Antenna Analog BeamformingMuhsiul Hassan, Nazmus Shaker Nafi, Nguyen Vo, Rahul Thakkar, Mark A. Gregory. 1-4 [doi]
- Dynamic RNN -CNN based Malware Classifier for Deep Learning AlgorithmYoungbok Cho. 1-6 [doi]
- Energy Efficiency Optimization in Energy Harvesting Two-Hop Half-duplex Relay SystemsJing Zhao, Chenchen Liu, Zhengyu Zhang, Shibin Zhang, Ming Zhao. 1-6 [doi]
- Relay Selection Scheme for Energy Harvesting IoT Networks with Direct LinkChenchen Liu, Yuyang Zheng, Zhengyu Zhang, Weilong Ren 0001. 1-4 [doi]
- An Orientation Aware Learning MAC for Multi-UAVs NetworksSaadullah Kalwar, Kwan-Wu Chin, Luyao Wang. 1-4 [doi]
- Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the LiteratureNoah Oghenefego Ogwara, Krassie Petrova, Mee Loong Bobby Yang. 1-4 [doi]
- Max-cut and min-flow theorem for coal-transportation networks based on fault-tolerant routingDa-Ren Chen, Hao-Yen Chang, Ye-Zheng Chen. 1-6 [doi]
- Two-Tier Spectrum Trading Strategy for Heterogeneous Cognitive Radio NetworksXiaowen Huang, Wenjie Zhang, Liwei Yang, Chai Kiat Yeo, Shengyu Chen. 1-6 [doi]
- A proposal of information diffusion model using information vitalityYuya Ota, Norihiko Shinomiya. 1-3 [doi]
- A Novel Relaying Mechanism for Multi-Cast Transmission with Ground-Aerial NOMASyeda Kanwal Zaidi, Syed Faraz Hasan, Xiang Gui. 1-6 [doi]
- Blockchain Enabled Opportunistic Fog-based Radio Access Network: A Position PaperJofina Jijin, Boon-Chong Seet, Peter Han Joo Chong. 1-3 [doi]
- Frame Synchronization Performance of Optical-Wireless Hybrid BPPM-OOK SystemTomohiro Kiguchi, Ran Sun, Hiromasa Habuchi, Yusuke Kozawa. 1-6 [doi]
- Decentralized Interference Mitigation Technique for D2D Networks Using Game Theory OptimizationSaad Aslam, Fakhrul Alam, Syed Faraz Hasan, Mohammad Rashid. 1-7 [doi]
- A Weight Based Channel Scheduling for LTE-A FemtocellsAbdullah Omar Arafat, Mark A. Gregory. 1-5 [doi]
- UAV-aided Data Collection in Self Organized IoT Network for Social Augmented RealityZhenjie Tan, Hua Qu, Jihong Zhao, Shiyu Zhou, Wenjie Wang 0001. 1-7 [doi]
- A Context-Aware and Technology-Assisted Informal Caregiver Selection Method to support Medical EmergencyMd. Akbar Hossain, Sayan Kumar Ray, Seyed Reza Shahamiri. 1-6 [doi]
- An Encryption Algorithm to Prevent Domain Name System Cache Poisoning AttacksXue Jun Li, Maode Ma, Narayanan Arjun. 1-6 [doi]
- Load-balancing In Software-Defined Networking: An Investigation On Influential System ParametersAmir Hossein Moravejosharieh, Francisco Claudio Araujo Palmeira. 1-6 [doi]
- Improving Prediction Accuracy for Power Consumption in Virtual EnvironmentsHumaira Abdul Salam, Franco Davoli, Andreas Timm-Giel. 1-6 [doi]
- Analog Least Mean Square Loop for Self-Interference Cancellation: Implementation and MeasurementsAnh Tuyen Le, Le Chung Tran, Xiaojing Huang, Y. Jay Guo. 1-6 [doi]
- Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN SettingJerzy Konorski. 1-7 [doi]
- Early Warning System with Real Time Tilt MonitoringBaden Parr, Daniel Konings, Mathew Legg, Fakhrul Alam. 1-3 [doi]
- A Disaster Response Framework Based on IoT and D2D Communication under 5G Network TechnologyShakil Ahmed, Mohammad Rashid, Fakhrul Alam, Bapon Fakhruddin. 1-6 [doi]
- Theoretical Analysis of Equal-Weight (2, 2) VSS on VN-CSK Illumination Light CommunicationKeisuke Manaka, Liyuan Chen, Hiromasa Habuchi, Yusuke Kozawa. 1-6 [doi]