academic journal | Q737498 |
open-access journal | Q773668 |
P6981 | ACNP journal ID | 3173077 |
P1209 | CN | 50-1212/TN |
P8375 | Crossref journal ID | 267204 |
P8926 | DBLP venue ID | journals/dcan |
P6180 | Dimensions Source ID | 1151995 |
P5115 | Directory of Open Access Journals ID | 2352-8648 |
P8903 | HAL journal ID | 117064 |
P236 | ISSN | 2352-8648 |
2468-5925 | ||
P7363 | ISSN-L | 2352-8648 |
P1277 | JUFO ID | 84043 |
P856 | official website | http://www.journals.elsevier.com/digital-communications-and-networks |
https://www.keaipublishing.com/en/journals/digital-communications-and-networks/ | ||
P10283 | OpenAlex ID | S2495769766 |
S4306549730 | ||
P7662 | Scilit journal ID | 1235970 |
P1156 | Scopus source ID | 21100823476 |
P972 | catalog | Directory of Open Access Journals | Q1227538 |
P275 | copyright license | Creative Commons Attribution-NonCommercial-NoDerivatives | Q6937225 |
P17 | country | People's Republic of China | Q148 |
P495 | country of origin | Kingdom of the Netherlands | Q29999 |
P8875 | indexed in bibliographic review | Scopus | Q371467 |
Chinese Science Citation Database | Q20716557 | ||
Science Citation Index Expanded | Q104047209 | ||
P407 | language of work or name | English | Q1860 |
P921 | main subject | information technology | Q11661 |
P127 | owned by | Chongqing University of Posts and Telecommunications | Q5104676 |
P123 | publisher | KeAi | Q52667636 |
P1476 | title | Digital communications and networks |
Q114848559 | 3-Multi ranked encryption with enhanced security in cloud computing |
Q124285497 | A WKNN-based approach for NB-IoT sensors localization |
Q57586718 | A blockchain future for internet of things security: a position paper |
Q123018063 | A blockchain-based Privacy-Preserving and Collusion-Resistant scheme (PPCR) for double auctions |
Q114848560 | A blockchain-based audit approach for encrypted data in federated learning |
Q114307239 | A blockchain-enabled wiki framework based on participatory design |
Q114671248 | A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications |
Q130083635 | A comparative study of name resolution and routing mechanisms in information-centric networks |
Q114902525 | A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing |
Q125801113 | A multi-layered policy generation and management engine for semantic policy mapping in clouds |
Q57431124 | A network security situation prediction model based on wavelet neural network with optimized parameters |
Q127992575 | A new type of blockchain for secure message exchange in VANET |
Q127023171 | A novel modeling approach for vertical handover based on dynamic k-partite graph in heterogeneous networks |
Q115044940 | A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI |
Q115044967 | A roadmap for security challenges in the Internet of Things |
Q126640204 | A simple 2D modulation code in single-reader two-track reading BPMR systems |
Q115044930 | A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing |
Q115044950 | A survey of edge computing-based designs for IoT security |
Q114902527 | A survey on deploying mobile deep learning applications: A systemic and technical perspective |
Q115044955 | A systematic literature review of blockchain cyber security |
Q121135716 | A time-aware searchable encryption scheme for EHRs |
Q121183404 | AQROM: A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks |
Q127216649 | AdaptiveMutate: a technique for privacy preservation |
Q127854233 | An architecture for digital hate content reduction with mobile edge computing |
Q114671246 | An efficient data aggregation scheme with local differential privacy in smart grid |
Q59429532 | An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks |
Q114671247 | An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things |
Q127938474 | Analysis of identifiers in IoT platforms |
Q129564076 | Analytical model of IoT CoAP traffic |
Q114387782 | Anonymous crowdsourcing-based WLAN indoor localization |
Q129075318 | Antenna selection for MIMO system based on pattern recognition |
Q115044928 | Application of meta-learning in cyberspace security: a survey |
Q122750555 | Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home |
Q114671245 | Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection |
Q115044923 | Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective |
Q129046470 | Caching resource management of mobile edge network based on Stackelberg game |
Q126779032 | DVCast: denoising and variable dct for analog visual communications |
Q129079582 | Deep reinforcement learning-based joint task offloading and bandwidth allocation for multi-user mobile edge computing |
Q115044932 | DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network |
Q128937722 | Design and analysis of multi-channel drop filter using dual L defected hexagonal photonic crystal ring resonator |
Q127461157 | Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks |
Q129648307 | Design of multi-antenna relaying for OFDM in impulsive noise environment |
Q115044957 | Developing a platform to evaluate and assess the security of wearable devices |
Q115044933 | Dynamic defenses in cyber security: Techniques, methods and challenges |
Q128218786 | Dynamic load balancing with learning model for Sudoku solving system |
Q126979537 | EECDH to prevent MITM attack in cloud computing |
Q115044934 | Editorial for special issue on ”security and privacy protection in the era of IoT devices” |
Q115044943 | Editorial: Special issue on blockchain and communication networks |
Q115044948 | Editorial: special issue on “The security, privacy, and digital forensics of mobile networks and mobile cloud” |
Q115044960 | Editorial: special issue on “big data security and privacy” |
Q126404034 | Electromagnetic spectrum chipless radio frequency identification: A review |
Q129035143 | Enabling intelligence in fog computing to achieve energy and latency reduction |
Q129035160 | Energy efficient and delay aware ternary-state transceivers for aerial base stations |
Q130054938 | Enhancing secrecy rates in a wiretap channel |
Q114671244 | Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes |
Q115044935 | Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers |
Q128772611 | Game-theoretic private blockchain design in edge computing networks |
Q130110162 | Gaussian broadcast channel with lossy state reconstruction |
Q122415535 | Granular classifier: Building traffic granules for encrypted traffic classification based on granular computing |
Q115044924 | Guest editorial: Special issue on security and privacy for AI-powered smart IoT applications |
Q115044925 | How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities |
Q114671250 | Information mining and similarity computation for semi- / un-structured sentences from the social data |
Q115044944 | Information security through controlled quantum teleportation networks |
Q114456102 | Joint computation offloading and parallel scheduling to maximize delay-guarantee in cooperative MEC systems |
Q114191331 | Kernel-based adversarial attacks and defenses on support vector classification |
Q114848562 | Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning |
Q114902526 | Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack |
Q114387780 | Multi-stage online task assignment driven by offline data under spatio-temporal crowdsourcing |
Q130173719 | Multifault diagnosis in WSN using a hybrid metaheuristic trained neural network |
Q128522442 | NLDA non-linear regression model for preserving data privacy in wireless sensor networks |
Q114952312 | NeurstrucEnergy: A bi-directional GNN model for energy prediction of neural networks in IoT |
Q128322990 | On the performance of web services, google cloud messaging and firebase cloud messaging |
Q111897718 | On the use of the genetic programming for balanced load distribution in software-defined networks |
Q113103177 | PRECESION: progressive recovery and restoration planning of interdependent services in enterprise data centers |
Q130064344 | Percolation analysis of large-scale wireless balloon networks |
Q120919940 | Performance analysis and comparison of PoW, PoS and DAG based blockchains |
Q114261757 | Performance analysis of an improved dynamic power management model in wireless sensor node |
Q56938739 | Pheromone based alternative route planning |
Q115044953 | Private membership test protocol with low communication complexity |
Q60536937 | Providing healthcare services on-the-fly using multi-player cooperation game theory in Internet of Vehicles (IoV) environment |
Q114671249 | Public integrity verification for data sharing in cloud with asynchronous revocation |
Q126398770 | Quanta - A platform for rapid control and monitoring of heterogeneous rbots |
Q127871208 | RFHUI: an RFID based human-unmanned aerial vehicle interaction system in an indoor environment |
Q128902748 | Rate distortion optimization for adaptive gradient quantization in federated learning |
Q115044952 | Recent advances in mobile edge computing and content caching |
Q114197128 | Research on encoding and decoding of non-binary polar codes over GF(2 ) |
Q115044937 | Robot and its living space: A roadmap for robot development based on the view of living space |
Q128786447 | Robust beamforming design for energy harvesting efficiency maximization in RIS-aided SWIPT system |
Q129253792 | S-transformation based integrated approach for spectrum estimation, storage, and sensing in cognitive radio |
Q122259994 | SM algorithms-based encryption scheme for large genomic data files |
Q129267702 | Secrecy sum-rate analysis of massive MIMO systems under dual-threat attacks using normalization methods |
Q111522156 | Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution |
Q115044941 | Security and privacy in 6G networks: New areas and new challenges |
Q115044938 | Security and privacy issues of physical objects in the IoT: Challenges and opportunities |
Q129267350 | Short video preloading via domain knowledge assisted deep reinforcement learning |
Q127980801 | Submillimeter wave communication versus millimeter wave communication |
Q121133048 | Substring-searchable attribute-based encryption and its application for IoT devices |
Q123132623 | Throughput-oriented associated transaction assignment in sharding blockchains for IoT social data storage |
Q127023043 | Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism |
Q122169629 | Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT |
Q128417528 | Tracing manufacturing processes using blockchain-based token compositions |
Q129038438 | Traffic-driven epidemic spreading and its control strategies |
Q114316962 | Users' experience matter: Delay sensitivity-aware computation offloading in mobile edge computing |
Q121009064 | VRS-DB: preserve confidentiality of users’ data using encryption approach |
Q115044963 | Visualization of big data security: a case study on the KDD99 cup data set |
Q114848561 | Visually meaningful image encryption algorithm based on digital signature |
Q129743582 | WITHDRAWN: Low signaling overhead group-based power-control scheme for massive machine-type communications |
Q129972632 | WITHDRAWN: Quality-of-service support in LTE-A systems with the DRX mechanism |
Q115044936 | WITHDRAWN: Security protocol of sensitive high utility itemset hiding in shared IoT environments |
Q128928532 | Weak harmonic signal detection method in chaotic interference based on extended Kalman filter |
Search more.