Computer Networks
IF
4.47
Papers
6,692
Papers 6,105
1 page of 611 pages (6,105 results)
Newest
#1Yuyu Zhao (SEU: Southeast University)H-Index: 2
#2Guang Cheng (SEU: Southeast University)H-Index: 7
Last. Lu Tang
view all 6 authors...
Abstract null null Threat situation awareness is one of the new major technologies to avoid network attacks and ensure equipment security. Facing the current IoT network architecture which is characterized by end equipments’ complex services, huge traffic and computing marginalization, real time threat situation awareness based on network traffic can effectively warn and clean latent threat. However, the existing threat situation awareness methods are mostly unitary and dependent on the central ...
Source
#1Abhishek Sharma (Krishna Institute of Engineering and Technology)
#2Amik Garg (Krishna Institute of Engineering and Technology)
Last. Parvin Kumar (Krishna Institute of Engineering and Technology)H-Index: 1
view all 5 authors...
Abstract null null The manuscript presents a performance optimization methodology for UWB signaling under IEEE 802.15.4a channel conditions using pulse shaping. IEEE 802.1.5.4a is widely adapted for wireless personal area network (WPAN), body area network (BAN) as networking standard. The modified pulse shaping is specifically analyzed for the outdoor and industrial IEEE 802.15.4a channel conditions. The pulse shaping is also validated for the effect of interference levels offered to the co-exis...
Source
#1Chuan Yu (NUDT: National University of Defense Technology)
#2Shuhui Chen (NUDT: National University of Defense Technology)
Last. Ziling Wei (NUDT: National University of Defense Technology)
view all 4 authors...
Abstract null null The 4G/Long Term Evolution (LTE) has become the dominant mobile access technology worldwide so far, while the development of the 5G/NR (New Radio) cellular network is also accelerating. Like the previous generations of mobile networks, the LTE network has encountered many security problems during its practical implementation and use process, which are exploited by various wild attacks. Given the similarities between 5G and LTE in the protocol stack of air interface, it is an e...
Source
#1Sanjeev Kumar (NITT: National Institute of Technology Tiruchirappalli)H-Index: 4
#2B. Janet (NITT: National Institute of Technology Tiruchirappalli)H-Index: 7
Abstract null null Modern malware threats demand a robust and scalable detection system. This paper presents a novel proactive monitoring and analysis architecture called malware threat intelligence system (MTIS) to collect and classify real-world samples of modern malware families. Microsoft Window‘s portable executable (PE) files are systematically labeled using clustering and AVClass engine. These labeled malware samples are visualized into grayscale images, which are further utilized for the...
Source
#1Carlo Kleber da Silva Rodrigues (UFABC: Universidade Federal do ABC)H-Index: 6
Abstract null null The IoT ecosystem envisions a new world fully integrated by smart devices exchanging data to enable more automated, accurate, and timely decisions. Nonetheless, this idealized scenario may be only implemented if the system database allow smart devices’ transactions to be efficiently processed and security is guaranteed. To tackle this challenge, this paper then analyzes three Blockchain integrated architectures, covering an assemblage of different popular IoT-application scena...
Source
#1An Braeken (VUB: Vrije Universiteit Brussel)H-Index: 13
Abstract null null Device-to-device (D2D) communication in 5G can offload large amounts of data from the core network and offer smaller delays in communication, making advantage of the proximity between the devices. Specific attention should be given to a dedicated authentication process as there are significant challenges with respect to security and privacy. We propose the first anonymous group D2D authentication and key agreement protocol, which can be integrated into the existing 5G-AKA prot...
Source
#1Bin Wang (SCUT: South China University of Technology)H-Index: 2
#2Fagui Liu (SCUT: South China University of Technology)H-Index: 10
Last. Dishi Xu (SCUT: South China University of Technology)
view all 5 authors...
Abstract null null Energy-efficient resource scheduling has become a hot issue in the field of cloud computing. However, there is an inevitable conflict between energy-saving and QoS optimization. In real-world scenarios, the volatility of cloud task arrival will cause the optimization problem to become more difficult. To achieve a better trade-off between these two goals, a novel resource scheduling framework based on collaborative optimization is proposed for the cloud computing environment. B...
Source
#1Yuan Liu (NEU: Northeastern University)H-Index: 9
#2Yixiao Lan (NEU: Northeastern University)
Last. Zhihong Tian (Guangzhou University)H-Index: 23
view all 5 authors...
Abstract null null The advent of neural network (NN) based deep learning, especially the recent development of the automatic design of networks, has brought unprecedented performance gains at heavy computational cost. On the other hand, in order to generate a new consensus block, Proof of Work (PoW) based blockchain systems routinely perform a huge amount of computation that does not achieve practical purposes but to solving a difficult cryptographic hash puzzle problem.In this study, we propose...
Source
#1Swapnil Sadashiv Shinde (UNIBO: University of Bologna)H-Index: 1
#2Dania Marabissi (University of Florence)H-Index: 18
Last. Daniele Tarchi (UNIBO: University of Bologna)H-Index: 19
view all 3 authors...
Abstract null null The 5G communication standard is characterized by an increased softwarization, allowing a higher flexibility able to cope with different requirements and services. In particular, Network Function Virtualization (NFV) is a recently introduced technology that enables a software implementation of different network functions exploiting virtualization techniques, hence, enabling their flexible deployment upon system requirements. Boosted by NFV, the concept of network slicing is ga...
Source
#1Raniyah Wazirali (SEU: Saudi Electronic University)H-Index: 3
#2Rami Ahmad (Sebha University)H-Index: 5
Last. Ashraf Abu-Ein (BAU: Al-Balqa` Applied University)H-Index: 3
view all 3 authors...
Abstract null null Phishing is an online fraud that deceives visitors by impersonating a legitimate website to steal their confidential or personal information. This is a well-known form of cybercrime. With the aim of detecting phishing sites, several phishing site detection techniques have recently been created. However, it fails to achieve the desired goal and has a large number of drawbacks, including low accuracy, long learning curve, and low-power embedded hardware. For covering such drawba...
Source
12345678910
Top fields of study
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.