ADAS: Adaptive Delay-Aligned Scheduling for Multipath Transmission in Heterogeneous Wireless Networks Du ChenDeyun GaoHongke Zhang OriginalPaper 03 April 2023 Pages: 1583 - 1595
LoRa network communication protocol based on location and time planning He XuewenCao Kaihua OriginalPaper 04 April 2023 Pages: 1596 - 1608
A RSS-based path loss model approaches multi-dimensional scaling to localize 2D sensor nodes in WSN Vijay RayarUdaykumar NaikPrabhakar S. Manage OriginalPaper 05 April 2023 Pages: 1609 - 1623
A novel raccoon optimization algorithm with multi-objective clustering strategy based routing protocol for WSNs Nour El Houda BourebiaChunlin Li OriginalPaper 10 April 2023 Pages: 1624 - 1640
Integrating the edge intelligence technology into image composition: A case study Peiyan YuanZhao HanXiaoyan Zhao OriginalPaper 12 April 2023 Pages: 1641 - 1651
SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance Tao LiYali LiuJianting Ning OriginalPaper 24 April 2023 Pages: 1652 - 1667
Joint task assignment and path planning for truck and drones in mobile crowdsensing Zijia WangBaoxian ZhangCheng Li OriginalPaper 24 April 2023 Pages: 1668 - 1679
Anomaly traffic detection based on feature fluctuation for secure industrial internet of things Jie YinChuntang ZhangGuan Gui OriginalPaper 26 April 2023 Pages: 1680 - 1695
A composite blockchain associated event traceability method for financial activities Junlu WangSu LiBaoyan Song OriginalPaper 23 May 2023 Pages: 1696 - 1715
A searchable encryption scheme with hidden search pattern and access pattern on distributed cloud system Shengchen DuanHong LiuLize Gu OriginalPaper 25 May 2023 Pages: 1716 - 1738
Quality of service aware routing in software defined video streaming: a survey Suguna ParamasivamR Leela Velusamy ReviewPaper 26 May 2023 Pages: 1739 - 1760
ERNSS-MCC: Efficient relay node selection scheme for mission critical communication using machine learning in VANET A. Anu MonishaT. R. ReshmiK. Murugan OriginalPaper 26 May 2023 Pages: 1761 - 1784
\(\chi\)perbp: a cloud-based lightweight mutual authentication protocol Morteza AdeliNasour BagheriSaru Kumari OriginalPaper 27 May 2023 Pages: 1785 - 1802
Parked vehicles crowdsourcing for task offloading in vehicular edge computing Feng ZengRanran RouJinsong Wu OriginalPaper 29 May 2023 Pages: 1803 - 1818
Enhanced Elman Spike Neural Network fostered intrusion detection framework for securing wireless sensor network R. Sarath KumarP. SampathM Ramkumar OriginalPaper 30 May 2023 Pages: 1819 - 1833
Towards verifiable and privacy-preserving account model on a consortium blockchain based on zk-SNARKs Xiaoyan HuWeicheng ZhouHua Wu OriginalPaper 30 May 2023 Pages: 1834 - 1851
A blockchain-based cyber-security for connected networks Deepak choudharyRoop Pahuja OriginalPaper 05 June 2023 Pages: 1852 - 1867
TRP: A TOPSIS-based RSU-enabled priority scheduling scheme to disseminate alert messages of WBAN sensors in hybrid VANETs Bidisha BhabaniJudhistir Mahapatro OriginalPaper 05 June 2023 Pages: 1868 - 1886
IoT intrusion detection model based on gated recurrent unit and residual network Guosheng ZhaoCai RenHuan Chen OriginalPaper 06 June 2023 Pages: 1887 - 1899
A Lightweight authentication approach based on linear feedback shift register and majority function for internet of things Elham EbrahimpourShahram Babaie OriginalPaper 07 June 2023 Pages: 1900 - 1915
Bit flipping attack detection in low power wide area networks using a deep learning approach Faezeh AlizadehAmir Jalaly Bidgoly OriginalPaper 13 June 2023 Pages: 1916 - 1926
MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain Bei YuLibo FengShaowen Yao OriginalPaper 14 June 2023 Pages: 1927 - 1943
A task allocation method based on data fusion of multimodal trajectory in mobile crowd sensing Jia LiuJian WangGuosheng Zhao OriginalPaper 14 June 2023 Pages: 1944 - 1958
An optimal model for enhancing network lifetime and cluster head selection using hybrid snake whale optimization Duraimurugan SamiayyaS. RadhikaChandrasekar A. OriginalPaper 27 June 2023 Pages: 1959 - 1974
A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System Ravi Raushan Kumar ChaudharyKakali Chatterjee OriginalPaper 27 June 2023 Pages: 1975 - 1992
TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization S. SivamohanS. S. SridharS. Krishnaveni OriginalPaper 27 June 2023 Pages: 1993 - 2021