International Journal Of Communication Systems

International Journal Of Communication Systems

国际通信系统杂志

  • 4区 中科院分区
  • Q3 JCR分区

高引用文章

文章名称 引用次数
Novel dynamic source routing protocol (DSR) based on genetic algorithm-bacterial foraging optimization (GA-BFO) 27
Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key 23
Tactile internet and its applications in 5G era: A comprehensive review 22
Power allocation schemes for wireless powered NOMA systems with imperfect CSI: An application in multiple antenna-based relay 19
Detection and defense of DDoS attack-based on deep learning in OpenFlow-based SDN 19
A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks 18
Nature inspired meta-heuristic algorithms for solving the service composition problem in the cloud environments 17
Multiobjective virtual machine placement mechanisms using nature-inspired metaheuristic algorithms in cloud environments: A comprehensive review 16
A learning-based approach for virtual machine placement in cloud data centers 16
Formal verification approaches in the web service composition: A comprehensive analysis of the current challenges for future research 15
An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure 13
Software defined vehicular networks: A comprehensive review 12
Modified pyramid dual tree direction filter-based image denoising via curvature scale and nonlocal mean multigrade remnant filter 12
Proactive content caching by exploiting transfer learning for mobile edge computing 12
FUCA: Fuzzy-based unequal clustering algorithm to prolong the lifetime of wireless sensor networks 11
Distributed fuzzy approach to unequal clustering and routing algorithm for wireless sensor networks 11
Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks 10
User centric three-factor authentication protocol for cloud-assisted wearable devices 10
A survey of overlay and underlay paradigms in cognitive radio networks 9
A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card 9
Towards green computing in wireless sensor networks: Controlled mobility-aided balanced tree approach 8
ECaD: Energy-efficient routing in flying ad hoc networks 8
Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks 8
A stable and reliable data dissemination scheme based on intelligent forwarding in VANETs 8
Cluster-based data dissemination, cluster head formation under sparse, and dense traffic conditions for vehicular ad hoc networks 8
A performance comparison of measurement matrices in compressive sensing 7
An efficient weighted trust-based malicious node detection scheme for wireless sensor networks 7
An intrusion detection system based on combining probability predictions of a tree of classifiers 7
Towards efficient data collection mechanisms in the vehicular ad hoc networks 7
Cluster-based emergency message dissemination strategy for VANET using V2V communication 7
Joint low-complexity equalization and carrier frequency offset compensation for underwater acoustic OFDM communication systems with banded-matrix approximation at different channel conditions 7
An agent-based workflow scheduling mechanism with deadline constraint on hybrid cloud environment 7
Efficient and secure business model for content centric network using elliptic curve cryptography 7
OW-SVM: Ontology and whale optimization-based support vector machine for privacy-preserved medical data classification in cloud 7
RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment 7
GUIDE: Smartphone sensors-based pedestrian indoor localization with heterogeneous devices 7
Survey on IoV routing protocols: Security and network architecture 6
An efficient routing protocol for the QoS support of large-scale MANETs 6
A decision tree-based NLOS detection method for the UWB indoor location tracking accuracy improvement 6
Query optimization mechanisms in the cloud environments: A systematic study 6
Structural and behavioral reference model for IoT-based elderly health-care systems in smart home 6
Design of a lightweight and anonymous authenticated key agreement protocol for wireless body area networks 6
Nature-inspired meta-heuristic algorithms for solving the load balancing problem in the software-defined network 6
A novel and efficient lattice-based authenticated key exchange protocol in C-K model 6
Design and extensive hardware performance analysis of an efficient pairwise key generation scheme for Smart Grid 6
Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network 6
Outage probability bound of decode and forward two-way full-duplex relay employing spatial modulation over cascaded alpha - mu channels 6
An efficient three factor-based authentication scheme in multiserver environment using ECC 5
F5N-based unequal clustering protocol (F5NUCP) for wireless sensor networks 5
Elucidating the challenges for the praxis of fog computing: An aspect-based study 5