Search

Showing total 457 results

Search Constraints

Start Over You searched for: Topic business Remove constraint Topic: business Topic telecommunications industry Remove constraint Topic: telecommunications industry Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
457 results

Search Results

1. Multi-domain authorization and decision-making method of access control in the edge environment

2. Topology construction and topology adjustment in flying Ad hoc networks for relay transmission

3. Performance assessment of a communication infrastructure with redundant topology: A complex network approach

4. A novel abstraction for security configuration in virtual networks

5. A Survey on Role of Blockchain for IoT: Applications and Technical Aspects

6. Resource Allocation in Multi-access Edge Computing for 5G-and-beyond networks

7. Reinforcement learning based joint trajectory design and resource allocation for RIS-aided UAV multicast networks

8. A survey on sliding window sketch for network measurement

9. Is proportional fair scheduling suitable for age-sensitive traffic?

10. Dominant coverage for target users at the lowest cost under competitive propagation in social networks

11. A survey on opportunistic routing protocols in the Internet of Underwater Things

12. Demand Island Routing for LEO satellite constellations

13. Collaborative prediction and detection of DDoS attacks in edge computing: A deep learning-based approach with distributed SDN

14. Digital-care in next generation networks: Requirements and future directions

15. Design and analysis of lightweight anonymity protocol for host- and AS-level anonymity

16. DynGATT: A dynamic GATT-based data synchronization protocol for BLE networks

17. Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN

18. Fault-tolerant resource allocation model for service function chains with joint diversity and redundancy

19. Energy-efficient proactive caching with multipath routing

20. An efficient SVM based DEHO classifier to detect DDoS attack in cloud computing environment

21. Privacy protection federated learning system based on blockchain and edge computing in mobile crowdsourcing

22. Task offloading in fog computing: A survey of algorithms and optimization techniques

23. Human-in-the-loop virtual reality offloading scheme in wireless 6G Terahertz networks

24. SDN and NFV for QoE-driven multimedia services delivery: The road towards 6G and beyond networks

25. A deep dive into DNS behavior and query failures

26. A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios

27. Adversarial machine learning for network intrusion detection: A comparative study

28. Utility Maximization for Splittable Task Offloading in IoT Edge Network

29. LEO satellite beam management algorithms

30. Service deployment design in latency-critical multi-cloud environment

31. GRAIN: Granular multi-label encrypted traffic classification using classifier chain

32. Measuring DoH with web ads

33. A survey on TCP enhancements using P4-programmable devices

34. A Comprehensive Review of Indoor/Outdoor Localization Solutions in IoT era: Research Challenges and Future Perspectives

35. A joint orchestration of security and functionality services at network edge

36. Online Distributed Denial of Service (DDoS) intrusion detection based on adaptive sliding window and morphological fractal dimension

37. Federation based joint client and server side Machine Learning for 5G and beyond Wireless Channel Estimation

38. Cooperative cache update using multi-agent recurrent deep reinforcement learning for mobile edge networks

39. Live migration of virtual machine memory content in networked systems

40. Intelligent Traffic Engineering (TE) system for rural broadband

41. Machine Learning for Hidden Nodes Detection in Unlicensed LTE Networks

42. A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment

43. A survey: Distributed Machine Learning for 5G and beyond

44. Secure IoT edge: Threat situation awareness based on network traffic

45. Friendship selection and management in social internet of things: A systematic review

46. Distinguishing malicious programs based on visualization and hybrid learning algorithms

47. Analyzing Blockchain integrated architectures for effective handling of IoT-ecosystem transactions

48. Deep Learning (DL)-based adaptive transport layer control in UAV Swarm Networks

49. Distance adaptive hybrid super-channels enabled by sliceable bandwidth variable transponder for spectrally efficient elastic optical networks

50. Task offloading optimization of cruising UAV with fixed trajectory