| Novel dynamic source routing protocol (DSR) based on genetic algorithm-bacterial foraging optimization (GA-BFO) |
27 |
| Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key |
23 |
| Tactile internet and its applications in 5G era: A comprehensive review |
22 |
| Power allocation schemes for wireless powered NOMA systems with imperfect CSI: An application in multiple antenna-based relay |
19 |
| Detection and defense of DDoS attack-based on deep learning in OpenFlow-based SDN |
19 |
| A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks |
18 |
| Nature inspired meta-heuristic algorithms for solving the service composition problem in the cloud environments |
17 |
| Multiobjective virtual machine placement mechanisms using nature-inspired metaheuristic algorithms in cloud environments: A comprehensive review |
16 |
| A learning-based approach for virtual machine placement in cloud data centers |
16 |
| Formal verification approaches in the web service composition: A comprehensive analysis of the current challenges for future research |
15 |
| An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure |
13 |
| Software defined vehicular networks: A comprehensive review |
12 |
| Modified pyramid dual tree direction filter-based image denoising via curvature scale and nonlocal mean multigrade remnant filter |
12 |
| Proactive content caching by exploiting transfer learning for mobile edge computing |
12 |
| FUCA: Fuzzy-based unequal clustering algorithm to prolong the lifetime of wireless sensor networks |
11 |
| Distributed fuzzy approach to unequal clustering and routing algorithm for wireless sensor networks |
11 |
| Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks |
10 |
| User centric three-factor authentication protocol for cloud-assisted wearable devices |
10 |
| A survey of overlay and underlay paradigms in cognitive radio networks |
9 |
| A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card |
9 |
| Towards green computing in wireless sensor networks: Controlled mobility-aided balanced tree approach |
8 |
| ECaD: Energy-efficient routing in flying ad hoc networks |
8 |
| Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks |
8 |
| A stable and reliable data dissemination scheme based on intelligent forwarding in VANETs |
8 |
| Cluster-based data dissemination, cluster head formation under sparse, and dense traffic conditions for vehicular ad hoc networks |
8 |
| A performance comparison of measurement matrices in compressive sensing |
7 |
| An efficient weighted trust-based malicious node detection scheme for wireless sensor networks |
7 |
| An intrusion detection system based on combining probability predictions of a tree of classifiers |
7 |
| Towards efficient data collection mechanisms in the vehicular ad hoc networks |
7 |
| Cluster-based emergency message dissemination strategy for VANET using V2V communication |
7 |
| Joint low-complexity equalization and carrier frequency offset compensation for underwater acoustic OFDM communication systems with banded-matrix approximation at different channel conditions |
7 |
| An agent-based workflow scheduling mechanism with deadline constraint on hybrid cloud environment |
7 |
| Efficient and secure business model for content centric network using elliptic curve cryptography |
7 |
| OW-SVM: Ontology and whale optimization-based support vector machine for privacy-preserved medical data classification in cloud |
7 |
| RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment |
7 |
| GUIDE: Smartphone sensors-based pedestrian indoor localization with heterogeneous devices |
7 |
| Survey on IoV routing protocols: Security and network architecture |
6 |
| An efficient routing protocol for the QoS support of large-scale MANETs |
6 |
| A decision tree-based NLOS detection method for the UWB indoor location tracking accuracy improvement |
6 |
| Query optimization mechanisms in the cloud environments: A systematic study |
6 |
| Structural and behavioral reference model for IoT-based elderly health-care systems in smart home |
6 |
| Design of a lightweight and anonymous authenticated key agreement protocol for wireless body area networks |
6 |
| Nature-inspired meta-heuristic algorithms for solving the load balancing problem in the software-defined network |
6 |
| A novel and efficient lattice-based authenticated key exchange protocol in C-K model |
6 |
| Design and extensive hardware performance analysis of an efficient pairwise key generation scheme for Smart Grid |
6 |
| Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network |
6 |
| Outage probability bound of decode and forward two-way full-duplex relay employing spatial modulation over cascaded alpha - mu channels |
6 |
| An efficient three factor-based authentication scheme in multiserver environment using ECC |
5 |
| F5N-based unequal clustering protocol (F5NUCP) for wireless sensor networks |
5 |
| Elucidating the challenges for the praxis of fog computing: An aspect-based study |
5 |