| Machine learning for internet of things data analysis: a survey |
78 |
| Edge computing technologies for Internet of Things: a primer |
60 |
| A blockchain future for internet of things security: a position paper |
42 |
| A roadmap for security challenges in the Internet of Things |
41 |
| Deep reinforcement learning-based joint task offloading and bandwidth allocation for multi-user mobile edge computing |
26 |
| A survey of 5G technologies: regulatory, standardization and industrial perspectives |
22 |
| Middleware technologies for cloud of things: a survey |
16 |
| Enabling intelligence in fog computing to achieve energy and latency reduction |
12 |
| Recent advancements in surface plasmon polaritons-plasmonics in subwavelength structures in microwave and terahertz regimes |
9 |
| Transmission in mobile cloudlet systems with intermittent connectivity in emergency areas |
8 |
| Anonymous crowdsourcing-based WLAN indoor localization |
7 |
| An improved and secure multiserver authentication scheme based on biometrics and smartcard |
6 |
| Semi-supervised multi-layered clustering model for intrusion detection |
6 |
| Traffic-driven epidemic spreading and its control strategies |
4 |
| Multipath multihop mmWave backhaul in ultra-dense small-cell network |
4 |
| Application of cognitive radio and interference cancellation in the L-Band based on future air-to-ground communication systems |
4 |
| Trade-off between accuracy, cost, and QoS using a beacon-on-demand strategy and Kalman filtering over a VANET |
4 |
| Performance analysis of cognitive radio networks using channel-prediction-probabilities and improved frame structure |
4 |
| A comparative study of name resolution and routing mechanisms in information-centric networks |
3 |
| Transient content caching and updating with modified harmony search for Internet of Things |
3 |
| Weak harmonic signal detection method in chaotic interference based on extended Kalman filter |
2 |
| Antenna selection for MIMO system based on pattern recognition |
2 |
| SDN assisted Stackelberg Game model for LTE-WiFi offloading in 5G networks |
2 |
| EECDH to prevent MITM attack in cloud computing |
2 |
| CLB: a multilevel co-operative load balancing algorithm for C-RAN architecture |
2 |
| Developing a platform to evaluate and assess the security of wearable devices |
2 |
| Beam interference suppression in multi-cell millimeter wave communications |
2 |
| A time-aware searchable encryption scheme for EHRs |
2 |
| Percolation analysis of large-scale wireless balloon networks |
2 |
| A time-domain estimation method of rapidly time-varying channels for OFDM-based LTE-R systems |
2 |
| QoS aware routing and wavelength allocation in optical burst switching networks using differential evolution optimization |
2 |
| A highly sustainable multi-band orthogonal wavelet code division multiplexing UWB communication system for underground mine channel |
2 |
| Design of a novel hybrid intercarrier interference mitigation technique through wavelet implication in an OFDM system |
2 |
| Combinatorial design-based quasi-cyclic LDPC codes with girth eight |
1 |
| Increasing public safety broadband network resiliency through traffic control |
1 |
| Effects of threshold based relay selection algorithms on the performance of an IEEE 802.16j mobile multi-hop relay (MMR) WiMAX network |
1 |
| Power consumption model of sector breathing based congestion control in mobile network |
1 |
| A BCH code assisted modified NCO based LSPF-DPLL topology for Nakagami-m, Rayleigh and Rician fading channels |
1 |
| A new protocol for concurrently allocating licensed spectrum to underlay cognitive users |
1 |
| A routing protocol for urban vehicular ad hoc networks to support non-safety applications |
1 |
| Design of multi-antenna relaying for OFDM in impulsive noise environment |
1 |
| Energy efficient and delay aware ternary-state transceivers for aerial base stations |
1 |
| Caching resource management of mobile edge network based on Stackelberg game |
1 |
| Secrecy sum-rate analysis of massive MIMO systems under dual-threat attacks using normalization methods |
1 |
| Development of multiple mobile networks call detailed records and its forensic analysis |
1 |
| AdaptiveMutate: a technique for privacy preservation |
1 |
| On the use of the genetic programming for balanced load distribution in software-defined networks |
1 |
| S-transformation based integrated approach for spectrum estimation, storage, and sensing in cognitive radio |
1 |
| Improving signature quality for network application identification |
0 |
| A novel modeling approach for vertical handover based on dynamic k-partite graph in heterogeneous networks |
0 |