Survey on SDN based network intrusion detection system using machine learning approaches
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-017-0630-0
Cooperative channel allocation and scheduling in multi-interface wireless mesh networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-017-0619-8
Energy efficient routing formation algorithm for hybrid ad-hoc network: A geometric programming approach
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-018-0643-3
Weight distribution and community reconstitution based on communities communications in social opportunistic networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-018-0649-x
Resource discovery in the peer to peer networks using an inverted ant colony optimization algorithm
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0644-2
Virtual network embedding based on modified genetic algorithm
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-017-0609-X
Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-017-0627-8
Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-019-00758-8
A budget constrained scheduling algorithm for executing workflow application in infrastructure as a service clouds
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-018-0662-0
An IoT based efficient hybrid recommender system for cardiovascular disease
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-019-00733-3
An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-018-0654-0
A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-019-00766-8
A hierarchical mobility management scheme based on software defined networking
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-017-0615-Z
A hybrid geographic-DTN routing protocol based on fuzzy logic in vehicular ad hoc networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-018-0642-4
Secure and efficient encrypted keyword search for multi-user setting in cloud computing
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-017-0622-0
Naive semi-supervised deep learning using pseudo-label
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0702-9
Fog computing in internet of things: Practical applications and future directions
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-019-00728-0
An optimized protocol for QoS and energy efficiency on wireless body area networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-017-0602-4
The strategy of path determination and traffic scheduling in private campus networks based on SDN
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-017-0623-Z
Pruneable sharding-based blockchain protocol
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0685-6
Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0667-8
Behavior Reconstruction Models for Large-scale Network Service Systems
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-017-0625-X
Two-tiered relay node placement for WSN-based home health monitoring system
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0638-0
Secure and efficient data delivery for fog-assisted wireless body area networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0705-6
Sensing and monitoring of information diffusion in complex online social networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0684-7
An efficient coverage hole-healing algorithm for area-coverage improvements in mobile sensor networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0675-8
Sidelobe interference reduced scheduling algorithm for mmWave device-to-device communication networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-018-0660-2
Localized topology control and on-demand power-efficient routing for wireless ad hoc and sensor networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-018-0658-9
MiFo: A novel edge network integration framework for fog computing
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-018-0663-z
Predictive control for visual servoing control of cyber physical systems with packet loss
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-019-00740-4
PPQAR: Parallel PSO for quantitative association rule mining
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0698-1
Distributed adaptive consensus control for networked robotic manipulators with time-varying delays under directed switching topologies
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-019-00751-1
Water rippling shaped clustering strategy for efficient performance of software define wireless sensor networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-017-0591-3
Secure deduplication with reliable and revocable key management in fog computing
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0682-9
GTTracker: Location-aware hierarchical model for identifying M-commerce business opportunities
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-017-0621-1
A data-driven and the deep learning based CDN recommendation framework for ICPs
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0673-X
Correction to: A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-018-0664-y
PCLNC: A low-cost intra-generation network coding strategy for P2P content distribution
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-018-0655-z
Enhancing SDN performance by enabling reasoning abilities in data traffic control
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-017-0613-1
Connectivity preserving obstacle avoidance localized motion planning algorithms for mobile wireless sensor networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0656-Y
XTRA—eXtended bit-Torrent pRotocol for Authenticated covert peer communication
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-018-0645-1
PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0703-8
Hybrid-triggered state feedback H∞ control for networked control systems with stochastic nonlinearity and quantization
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0671-Z
An approach of robust power control for cognitive radio networks based on chance constraints
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-018-0665-x
Joint radio resource allocation in fog radio access network for healthcare
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0707-4
A code protection method against function call analysis in P2P network
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-019-00757-9
Ad-hoc messaging infrastructure for peer-to-peer communication
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/s12083-017-0628-7
Asynchronous neighbor discovery with unreliable link in wireless mobile networks
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-018-0672-Y
Fog computing support scheme based on fusion of location service and privacy preservation for QoS enhancement
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-019-00722-6
A time-aware resource search strategy with the ant colony optimization in MANETs
来源期刊:Peer-to-Peer Networking and ApplicationsDOI:10.1007/S12083-019-00750-2