Parallelism of the finite-time dynamics method based on GPU Yongfeng KongZhenhui HuangWanjie Xiong Regular Paper 13 March 2022 Pages: 1721 - 1738
All-dummy k-anonymous privacy protection algorithm based on location offset Jianghui LiuShengxiang Wang Regular Paper Open access 13 March 2022 Pages: 1739 - 1751
A wrapper method based on a modified two-step league championship algorithm for detecting botnets in IoT environments Taha ShojarazaviHamid BaratiAli Barati Regular Paper 17 March 2022 Pages: 1753 - 1774
Wireless sensor networks: a survey, categorization, main issues, and future orientations for clustering protocols Salim El Khediri Regular Paper 22 March 2022 Pages: 1775 - 1837
Formal model for inter-component communication and its security in android Mohamed A. El-ZawawyParvez FarukiMauro Conti Regular Paper Open access 27 March 2022 Pages: 1839 - 1865
An overview of data reduction solutions at the edge of IoT systems: a systematic mapping of the literature LaƩrcio PioliCarina F. DornelesMario A. R. Dantas Regular Paper 28 March 2022 Pages: 1867 - 1889
Performance analysis of the unslotted IEEE 802.15.4k MAC protocols under saturated traffic and fading channel conditions Lynda AlkamaLouiza Bouallouche-MedjkouneLina Bachiri Regular Paper 30 March 2022 Pages: 1891 - 1922
A reliability estimation framework for cognitive radio V2V communications and an ANN-based model for automating estimations Somayeh BahramnejadNaser Movahhedinia Regular Paper 04 April 2022 Pages: 1923 - 1947