Most Cited Articles

Open access

ISSN: 2352-8648
CN: 50-1212/TN
p-ISSN: 2468-5925

A systematic literature review of blockchain cyber security

Share article

Security and privacy in 6G networks: New areas and new challenges

Share article

Deep reinforcement learning-based joint task offloading and bandwidth allocation for multi-user mobile edge computing

Share article

Service-aware 6G: An intelligent and open network based on the convergence of communication, computing and caching

Share article

A survey of edge computing-based designs for IoT security

Share article

Performance analysis and comparison of PoW, PoS and DAG based blockchains

Share article

A new type of blockchain for secure message exchange in VANET

Share article

Tracing manufacturing processes using blockchain-based token compositions

Share article

Enabling intelligence in fog computing to achieve energy and latency reduction

Share article

Real-time air pollution monitoring with sensors on city bus

Share article

Blockchain-enabled resource management and sharing for 6G communications

Share article

Privacy preservation in permissionless blockchain: A survey

Share article

Attacks and defences on intelligent connected vehicles: a survey

Share article

Recent advances in Industrial Internet: insights and challenges

Share article

Recent advances in mobile edge computing and content caching

Share article

A survey on deep learning for textual emotion analysis in social networks

Share article

Intent-based networks for 6G: Insights and challenges

Share article

Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks

Share article

Survey on recent advances in IoT application layer protocols and machine learning scope for research directions

Share article

Towards asynchronous federated learning for heterogeneous edge-powered internet of things

Share article

Pervasive intelligent endogenous 6G wireless systems: Prospects, theories and key technologies

Share article

Security and privacy issues of physical objects in the IoT: Challenges and opportunities

Share article

An ensemble deep learning model for cyber threat hunting in industrial internet of things

Share article

A survey on communication protocols and performance evaluations for Internet of Things

Share article

An intelligent task offloading algorithm (iTOA) for UAV edge computing network

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.