scinapse is loading now...
IEEE Communications Surveys and Tutorials
IF
20.23
Papers
1117
Papers 1115
1 page of 112 pages (1,115 results)
Newest
Published on Apr 11, 2019in IEEE Communications Surveys and Tutorials 20.23
Source Cite
Published on Mar 25, 2019in IEEE Communications Surveys and Tutorials 20.23
Hina Tabassum1
Estimated H-index: 1
(York University),
Mohammad Salehi1
Estimated H-index: 1
(University of Manitoba),
Ekram Hossain64
Estimated H-index: 64
(University of Manitoba)
This article provides a tutorial on mobility-aware performance analysis of cellular networks considering both the spatially random (where base stations (BSs) are deployed according to a homogeneous point process) and deterministic grid-based network deployment topologies. We first provide a summary of users’ mobility models with no spatiotemporal correlations (e.g., random walk, random way point, random direction), with spatial correlations (e.g., pursue mobility, column mobility), and with temp...
Source Cite
Published on Jan 1, 2019in IEEE Communications Surveys and Tutorials 20.23
Martin Husák5
Estimated H-index: 5
(Masaryk University),
Jana Komarkova1
Estimated H-index: 1
(Masaryk University)
+ 1 AuthorsPavel Čeleda11
Estimated H-index: 11
(Masaryk University)
This paper provides a survey of prediction, and forecasting methods used in cyber security. Four main tasks are discussed first, attack projection and intention recognition, in which there is a need to predict the next move or the intentions of the attacker, intrusion prediction, in which there is a need to predict upcoming cyber attacks, and network security situation forecasting, in which we project cybersecurity situation in the whole network. Methods and approaches for addressing these tasks...
1 Citations Source Cite
Published on Jan 1, 2019in IEEE Communications Surveys and Tutorials 20.23
Behnam Dezfouli8
Estimated H-index: 8
(Santa Clara University),
Vahid Esmaeelzadeh1
Estimated H-index: 1
(Santa Clara University)
+ 1 AuthorsMarjan Radi8
Estimated H-index: 8
(Western Digital)
The significant growth in the number of WiFi-enabled devices as well as the increase in the traffic conveyed through wireless local area networks (WLANs) necessitate the adoption of new network control mechanisms. Specifically, dense deployment of access points, client mobility, and emerging QoS demands bring about challenges that cannot be effectively addressed by distributed mechanisms. Recent studies show that software-defined WLANs (SDWLANs) simplify network control, improve QoS provisioning...
1 Citations Source Cite
Published on Jan 1, 2019in IEEE Communications Surveys and Tutorials 20.23
Hakima Khelifi1
Estimated H-index: 1
(Beijing Institute of Technology),
Senlin Luo2
Estimated H-index: 2
(Beijing Institute of Technology)
+ 4 AuthorsAdlen Ksentini25
Estimated H-index: 25
(Institut Eurécom)
Information-Centric Networking (ICN) has been proposed as one of the future Internet architectures. It is poised to address the challenges faced by today’s Internet that include, but not limited to, scalability, addressing, security, and privacy. Furthermore, it also aims at meeting the requirements for new emerging Internet applications. To realize ICN, Named Data Networking (NDN) is one of the recent implementations of ICN that provides a suitable communication approach due to its clean slate ...
1 Citations Source Cite
Published on Jan 1, 2018in IEEE Communications Surveys and Tutorials 20.23
Baraq Ghaleb3
Estimated H-index: 3
(Edinburgh Napier University),
Ahmed Yassin Al-Dubai11
Estimated H-index: 11
(Edinburgh Napier University)
+ 4 AuthorsAzzedine Boukerche47
Estimated H-index: 47
(University of Ottawa)
Driven by the special requirements of the Low-power and Lossy Networks (LLNs), the IPv6 Routing Protocol for LLNs (RPL) was standardized by the IETF some six years ago to tackle the routing issue in such networks. Since its introduction, however, numerous studies have pointed out that, in its current form, RPL suffers from issues that limit its efficiency and domain of applicability. Thus, several solutions have been proposed in the literature in an attempt to overcome these identified limitatio...
Source Cite
Published on Jan 1, 2019in IEEE Communications Surveys and Tutorials 20.23
Anna Volkova1
Estimated H-index: 1
(University of Passau),
Michael Niedermeier3
Estimated H-index: 3
(University of Passau)
+ 1 AuthorsH. de Meer27
Estimated H-index: 27
(University of Passau)
With the ongoing adoption of remotely communicating and interacting control systems harbored by critical infrastructures, the potential attack surface of such systems also increases drastically. Therefore, not only the need for standardized and manufacturer-agnostic control system communication protocols has grown, but also the requirement to protect those control systems’ communication. There have already been numerous security analyses of different control system communication protocols; yet, ...
1 Citations Source Cite
Published on Jan 1, 2019in IEEE Communications Surveys and Tutorials 20.23
Daniel Diaz-Sanchez10
Estimated H-index: 10
,
Andrés Marín-López4
Estimated H-index: 4
+ 2 AuthorsR. Simon Sherratt10
Estimated H-index: 10
Source Cite
Published on Jan 1, 2019in IEEE Communications Surveys and Tutorials 20.23
Roberto Massi de Oliveira1
Estimated H-index: 1
,
Alex Borges Vieira8
Estimated H-index: 8
+ 1 AuthorsMoisés Vidal Ribeiro15
Estimated H-index: 15
In the literature, the majority of research efforts in power line communication (PLC) has been focused on the physical layer in order to deal with issues such as the time varying behavior of loads in electric power systems, the presence of high power impulsive noise, the occurrence of impedance mismatching, the widespread use of unshielded power cables, and the existence of coupling losses. While some works have also been carried out on the PLC medium access control (MAC) sublayer, there are sco...
2 Citations Source Cite
12345678910