Ausgabe 4/2022
Inhalt (43 Artikel)
Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT
Yongli Tang, Yanpeng Ba, Lixiang Li, Xiaojun Wang, Xixi Yan
Cloud to cloud data migration using self sovereign identity for 5G and beyond
M. G. Aruna, Mohammad Kamrul Hasan, Shayla Islam, K. G. Mohan, Preeta Sharan, Rosilah Hassan
A secure authentication technique for connecting different IoT devices in the smart city infrastructure
Rohit Sharma, Rajeev Arya
SDN–IoT empowered intelligent framework for industry 4.0 applications during COVID-19 pandemic
Anichur Rahman, Chinmay Chakraborty, Adnan Anwar, Md. Razaul Karim, Md. Jahidul Islam, Dipanjali Kundu, Ziaur Rahman, Shahab S. Band
An efficient malware detection approach with feature weighting based on Harris Hawks optimization
Omar A. Alzubi, Jafar A. Alzubi, Ala’ M. Al-Zoubi, Mohammad A. Hassonah, Utku Kose
Offloading strategy with PSO for mobile edge computing based on cache mechanism
Wenqi Zhou, Lunyuan Chen, Shunpu Tang, Lijia Lai, Junjuan Xia, Fasheng Zhou, Liseng Fan
Joint mode selection and user association in D2D enabled multitier C-RAN
Tahir Ahmad, Sher Ali, Syed Bilal Hussian Shah, Inam Ullah Khan, Muhammad Abul Hassan, Syed Irfan Ullah
Intelligent ubiquitous computing for future UAV-enabled MEC network systems
Lunyuan Chen, Rui Zhao, Ke He, Zichao Zhao, Liseng Fan
Joint wireless power transfer and task offloading in mobile edge computing: a survey
Ehzaz Mustafa, Junaid Shuja, S. Khaliq uz Zaman, Ali Imran Jehangiri, Sadia Din, Faisal Rehman, Saad Mustafa, Tahir Maqsood, Abdul Nasir Khan
A survey on internet of energy security: related fields, challenges, threats and emerging technologies
Mazin Mohammed Mogadem, Yan Li, Daniel Limenew Meheretie
A federated approach to Android malware classification through Perm-Maps
Gianni D’Angelo, Francesco Palmieri, Antonio Robustelli
Efficient user-channel pairing with power-domain sum-rate maximization in opportunistic hybrid OFDMA-NOMA IoT systems
Sharief Abdel-Razeq, Haitham Al-Obiedollah, Haythem Bany Salameh
Privacy preserving personalized blockchain reliability prediction via federated learning in IoT environments
Jianlong Xu, Jian Lin, Wei Liang, Kuan-Ching Li
An optimized human resource management model for cloud-edge computing in the internet of things
Yishu Liu, Wenjie Zhang, Qi Zhang, Monire Norouzi
Cluster mechanism for sensing data report using robust collaborative distributed spectrum sensing
Rania A. Mokhtar, Rashid A. Saeed, Hesham Alhumyani, Mashael Khayyat, S. Abdel-Khalek
Efficient privacy-preserving anonymous authentication scheme for human predictive online education system
Subramani Jegadeesan, Mohammad S. Obaidat, Pandi Vijayakumar, Maria Azees, Marimuthu Karuppiah
CTSLoc: an indoor localization method based on CNN by using time-series RSSI
Jingbin Liu, Bing Jia, Lei Guo, Baoqi Huang, Lei Wang, Thar Baker
Improving load balancing for data-duplication in big data cloud computing networks
Amir Javadpour, Ali Majed Hossein Abadi, Samira Rezaei, Mozhdeh Zomorodian, Ali Shokouhi Rostami
Spark-ITGO: a parallel invasive tumor growth optimization algorithm on spark
Jiaqin Lin, Anghong Xiao, Shoubin Dong, Jing Zhou
Applying neural networks to predict HPC-I/O bandwidth over seismic data on lustre file system for ExSeisDat
Abdul Jabbar Saeed Tipu, Padraig Ó Conbhuí, Enda Howley
Two-stage selection of distributed data centers based on deep reinforcement learning
Qirui Li, Zhiping Peng, Delong Cui, Jianpeng Lin, Jieguang He
An explainable and efficient deep learning framework for video anomaly detection
Chongke Wu, Sicong Shao, Cihan Tunc, Pratik Satam, Salim Hariri
Constructing software countermeasures against instruction manipulation attacks: an approach based on vulnerability evaluation using fault simulator
Junichi Sakamoto, Shungo Hayashi, Daisuke Fujimoto, Tsutomu Matsumoto
Simulating multi-agent-based computation offloading for autonomous cars
Hamza Ouarnoughi, Emmanuelle Grislin-Le Strugeon, Smail Niar
Security framework for smart cyber infrastructure
Shalaka Satam, Pratik Satam, Jesus Pacheco, Salim Hariri
Software enhancement effort estimation using correlation-based feature selection and stacking ensemble method
Zaineb Sakhrawi, Asma Sellami, Nadia Bouassida
Detection and classification of sensor anomalies for simulating urban traffic scenarios
Chiara Bachechi, Federica Rollo, Laura Po
Measuring performances and footprint of blockchains with BCTMark: a case study on Ethereum smart contracts energy consumption
Dimitri Saingre, Thomas Ledoux, Jean-Marc Menaud
Practical and configurable network traffic classification using probabilistic machine learning
Jiahui Chen, Joe Breen, Jeff M. Phillips, Jacobus Van der Merwe
Fair sharing of network resources among workflow ensembles
George Papadimitriou, Eric Lyons, Cong Wang, Komal Thareja, Ryan Tanaka, Paul Ruth, Ivan Rodero, Ewa Deelman, Michael Zink, Anirban Mandal
Using advanced data structures to enable responsive security monitoring
Janet Vorobyeva, Daniel R. Delayo, Michael A. Bender, Martín Farach-Colton, Prashant Pandey, Cynthia A. Phillips, Shikha Singh, Eric D. Thomas, Thomas M. Kroeger
Netostat: analyzing dynamic flow patterns in high-speed networks
Sugeerth Murugesan, Mariam Kiran, Bernd Hamann, Gunther H. Weber
High-performance reliable network-multicast over a trial deployment
Yuanlong Tan, Malathi Veeraraghavan, Hwajung Lee, Steven Emmerson, Jack W. Davidson
Multi-domain network infrastructure based on P4 programmable devices for Digital Data Marketplaces
Sara Shakeri, Lourens Veen, Paola Grosso
The NetSage measurement and analysis framework in practice
Jennifer M. Schopf, Katrina Turner, Dan Doyle, Andrew Lake, Jason Leigh, Brian L. Tierney
Analysis of NVMe over fabrics with SCinet DTN-as-a-Service
Se-young Yu, Jim Chen, Fei Yeh, Joe Mambretti, Xiao Wang, Anna Giannakou, Eric Pouyoul, Marc Lyonnais
On an improved clustering algorithm based on node density for WSN routing protocol
Luyao Chang, Fan Li, Xinzheng Niu, Jiahui Zhu
SDN-based bandwidth scheduling for prioritized data transfer between data centers
Aiqin Hou, Chase Q. Wu, Qiang Duan, Dawei Quan, Liudong Zuo, Yangyang Li, Michelle M. Zhu, Dingyi Fang
Correction to: A secure authentication technique for connecting different IoT devices in the smart city infrastructure
Rohit Sharma, Rajeev Arya