| A resource allocation model based on double-sided combinational auctions for transparent computing |
58 |
| Survey on SDN based network intrusion detection system using machine learning approaches |
35 |
| Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications |
27 |
| UAVs joint vehicles as data mules for fast codes dissemination for edge networking in Smart City |
21 |
| Weight distribution and community reconstitution based on communities communications in social opportunistic networks |
18 |
| Sensor communication area and node extend routing algorithm in opportunistic networks |
17 |
| Cooperative channel allocation and scheduling in multi-interface wireless mesh networks |
16 |
| Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks |
15 |
| Mining health-risk factors using PHR similarity in a hybrid P2P network |
15 |
| Mining-based lifecare recommendation using peer-to-peer dataset and adaptive decision feedback |
15 |
| Resource discovery in the peer to peer networks using an inverted ant colony optimization algorithm |
14 |
| An improved and provably secure three-factor user authentication scheme for wireless sensor networks |
12 |
| Multi working sets alternate covering scheme for continuous partial coverage in WSNs |
11 |
| Fog computing enabling geographic routing for urban area vehicular network |
11 |
| A novelistic approach for energy efficient routing using single and multiple data sinks in heterogeneous wireless sensor network |
11 |
| Resource allocation in cooperative cognitive radio networks towards secure communications for maritime big data systems |
10 |
| DSCB: Dual sink approach using clustering in body area network |
10 |
| Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks |
10 |
| A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs |
10 |
| A block-level caching optimization method for mobile transparent computing |
9 |
| FINDER: A D2D based critical communications framework for disaster management in 5G |
9 |
| Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET |
8 |
| Virtual network embedding based on modified genetic algorithm |
8 |
| Energy efficient topology management scheme based on clustering technique for software defined wireless sensor network |
8 |
| Efficient multi-tasks scheduling algorithm in mobile cloud computing with time constraints |
8 |
| Neighboring vehicle-assisted fast handoff for vehicular fog communications |
7 |
| Towards secure authenticating of cache in the reader for RFID-based IoT systems |
7 |
| EASM: Efficiency-aware switch migration for balancing controller loads in software-defined networking |
6 |
| An IoT based efficient hybrid recommender system for cardiovascular disease |
6 |
| DEHCIC: A distributed energy-aware hexagon based clustering algorithm to improve coverage in wireless sensor networks |
6 |
| Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks |
6 |
| Big program code dissemination scheme for emergency software-define wireless sensor networks |
6 |
| Centrality prediction based on K-order Markov chain in Mobile Social Networks |
6 |
| A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks |
6 |
| Joint optimization of wireless bandwidth and computing resource in cloudlet-based mobile cloud computing environment |
5 |
| Tor anonymous traffic identification based on gravitational clustering |
5 |
| Secure, efficient and revocable data sharing scheme for vehicular fogs |
5 |
| Novel energy-efficient secure routing protocol for wireless sensor networks with Mobile sink |
5 |
| Resource allocation in SDN based 5G cellular networks |
5 |
| A robust mutual authentication scheme for session initiation protocol with key establishment |
5 |
| Efficient data-forwarding method in delay-tolerant P2P networking for IoT services |
5 |
| An improved network security situation assessment approach in software defined networks |
5 |
| A budget constrained scheduling algorithm for executing workflow application in infrastructure as a service clouds |
5 |
| Self-adaptive bat algorithm for large scale cloud manufacturing service composition |
5 |
| An efficient model for vehicular cloud computing with prioritizing computing resources |
4 |
| A hierarchical mobility management scheme based on software defined networking |
4 |
| An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks |
4 |
| FGDA: Fine-grained data analysis in privacy-preserving smart grid communications |
4 |
| Energy balancing RPL protocol with multipath for wireless sensor networks |
4 |
| Key frame extraction scheme based on sliding window and features |
4 |