


default search action
Peer-to-Peer Networking and Applications, Volume 19
Volume 19, Number 1, February 2026
- Neetu Singh, Ritu Agarwal:

Hybrid net: enhanced DTL based intrusion detection system for electric vehicular network using hybrid architecture. 1 - Jia Liu, Wenjun Fan, Enggee Lim, Yifan Dai, Alexei Lisitsa:

ML-BF: Responsive and Dynamic Intrusion Detection towards Intelligent Connected Vehicles. 2 - Chandra Prakash Singh, Rohita Yamaganti, Lokendra Singh Umrao:

A privacy-preserving and secure framework using blockchain-based quantum-inspired complex convolutional neural network for IoT-driven smart cities. 3 - Posham Bhargava Reddy, Chapram Sudhakar:

TDCTO: TOPSIS based deadline aware and cost effective taskoffloading in edge-fog-cloud computing environment. 4 - Issam Zidi

, Radhia Zaghdoud, Salim El Khediri:
Optimizing block size and cloud storage in blockchain technology using an NSGA-III and SVM hybrid approach. 5 - Md. Kamaruzzaman, Abhijit Chandra, Md. Azharuddin:

A novel priority-driven heap-based scheduling algorithm for mobile chargers in wireless rechargeable sensor networks. 6 - Muhammad Nasir Mumtaz Bhutta, Ghulam Irtaza, Abid Mehmood, Rabeya Hamood, Imran Makhdoom

, Mourad Elhadef, Muhammad Habib Ur Rehman:
A systematic review of secure federated learning based on blockchain and Multi-Party computation. 7 - Bhupesh B. Lonkar

, Pallavi Charde
, Annaji Kuthe
, Archana Dehankar, Pranali Dandekar, Nischal Puri
, Dinesh Banabakode:
A review of hybrid clustering and routing protocols for the hotspot problem in wireless sensor networks. 8 - Hongjuan Kang, Bing Guo, Na Shi, Dejun Huang, Awen Luo:

D2DA: Machine learning-empowered distributed authorization model in smart homes. 9 - Madhusudhan Golla, Veena Kalludi Narasimhaiah:

A baseline framework for 6G-enabled Internet-of-vehicle for efficient traffic management. 10 - Junaid Alam, Soumyadev Maity, Saifulla Md. Abdul, Ruhul Amin:

Securing remote computation with algebraic signature techniques in trusted execution environments. 11 - Ruikang Sun, Shaopeng Guan

:
A blockchain-based privacy-preserving data governance framework for Industry 5.0 smart factories. 12 - Zike Liang, Yuanzhi Ni, Hongfeng Tao, Heng Li:

Dependency-aware task offloading and energy optimization in UAV-assisted MEC systems. 13 - Yonggen Gu, Dian Chen, Yu Long:

BesCo: Blockchain-enabled secure collaboration framework for multi-inspection agency integration. 14 - Moting Su, Junrui Gao, Ruoyu Zhao, Haofan Wang, Fengshu Li:

Visually meaningful encryption for UAV image management achieving a balance between privacy and visual usability. 15 - Hardik Arya, Nisha Kandhoul, Sanjay K. Dhurandher, Isaac Woungang:

Adaptive sliding window and LightGBM-based DDoS attack detection framework for IoT networks. 16 - Ying Shen, Zhanyou Ma:

Analysis of P2P networks based on Geo/Geo/c+d discrete-time queue. 17 - Yang Peng

, Jie Huang:
BARM: A decentralized and manipulation-resistant reputation management approach for distributed networks. 18 - Shenqing Wang, Xinlong Wang, Feng Zhang, Chuan Zhao, Chunpeng Ge, Jian Wang:

A decentralized multi-authority attribute-based encryption in eHealthcare. 19 - Siyuan Chen

, Pingfan Chang, Zhimin Guo:
A fine-grained EHR data sharing system for IoMT: Efficient revocation outsourcing based on RPCH. 20 - G. Augusta Kani, G. Anurekha

, Bharathi NA, Ancy A. Micheal
:
Blockchain-Based intrusion detection system for IoMT utilizing an enhanced artificial bee colony (E-ABC) and deep belief network (DBN). 21 - M. Sheik Dawood

, S. Sridevi
, C. Sujatha, Janjhyam Venkata Naga Ramesh:
Enhanced cluster head selection and energy efficient routing using optimized dual-path multi-scale attention guided network in WSN environment. 22 - Tingting Li, Yanjun Li, Yuzhe Chen, Jianji Shao, Zhibo Wang

:
Maximizing secrecy rate for IRS-assisted UAV network with an aerial eavesdropper. 23 - Khaled Alanezi, Tarun Annapareddy, Shafiullah Khan, Shivakant Mishra:

An edge-based IDS for the IoT using combined ML and generative AI models. 24 - Abida Naz

, Irshad Ullah, Muhammad Uzair, Muhammad Fayyaz Khokhar, Ayesha Sabir, Riaz Ullah Khan:
AFL-SecNet: An adaptive federated learning framework for secure and privacy-preserving network traffic analysis. 25 - S. Mathupriya, Ambayiram Chinnasamy, Sathies Kumar Thangarajan:

Energy-efficient wireless sensor networks: A novel hybrid adaptive archimedes marine predator-based routing strategy. 26 - Wei-Kuo Chiang

, Po-Yu Liao, Chia-Jui Liu:
BATKA: batch authentication and tree-based key agreement for secure and efficient grouping of vehicles in 5G-VANET. 27 - Muhammad Jawad Akhtar, Abdullah G. Alharbi

, Muhammad Tanveer
:
Lightweight authentication framework for iot-centric smart healthcare systems. 28 - Pravinth Raja, Dhanalakshmi B. K, Rajan T

, Vinayakumar Ravi, Norah Saleh Alghamdi:
A context-aware multi-modal generative adversarial network for real-time anomaly detection in video surveillance. 29 - Narinder Verma, Neerendra Kumar, Khalid K. Almuzaini, Anurag Sinha, Syed Abid Hussain:

A real-time intelligent intrusion detection framework for robotic system cybersecurity. 30 - Pooja Kumari, Ankit Kumar Jain, Abhishek Sharma:

An adaptive framework for real-time detection and mitigation of DDoS attacks in software-defined networks. 31 - G. Logeswari, Rudraksh Purbia, Tamilarasi K, S. Bose:

IA-IDS: an intelligent adaptive intrusion detection system for IoT security using CNN, BiLSTM, and attention mechanism. 32 - Gaojuan Fan, Qingyi Huang, Junchao Ma, Hafiz Muhammad Sanaullah Badar, Chongsheng Zhang, Ke Yuan:

Anomal-EFD: A self-supervised model for anomaly detection in dynamic IoT networks. 33 - P. J. Beslin Pajila

, Y. Harold Robinson
, J. A. Jevin
:
Blockchain-enabled deep learning techniques for providing security in wireless sensor networks. 34 - Raj Kumar Baliyar Singh

, Jatindra Kumar Dash, K. Hemant Kumar Reddy:
The role of Edge-AI in edge enabled IoT systems: A comprehensive performance analysis. 35 - Anupriya Kaushal, Aruna Malik:

Trusted clustering framework for secure wireless sensor networks using Bi-LSTM and walrus optimization algorithm. 36 - Faraj Chishti, Geetanjali Rathee:

An autonomous intrusion detection framework leveraging multi-layered stacking ensemble architectures with dynamic machine learning-driven feature subset optimisation. 37 - CuiYing Han, Faeiz M. Alserhani

, Tariq Ahamed Ahanger
, Najah Kalifah Almazmomi, Arshad Hashmi
:
Adaptive cyber threat detection in internet of things environment using deep learning and metaheuristic optimization. 38 - G. Saravanan, A. Yazhini

, Bapayya Naidu Kommula, P. Mani:
Energy optimization in smart grids: leveraging gazelle algorithm and deep belief networks in IoT-connected sensor networks. 39
Volume 19, Number 2, March 2026
- Natalia Kurkina, Ján Papaj, Jozef Badar:

Enhancing routing efficiency in Cloud MANET using KNN and fitness function for dynamic network environments. 40 - Qiang Tang, Heng Liu, Jin Wang, Kun Yang, Osama Alfarraj:

Priority tasks based average utility maximization strategy for multi-UAV assisted MEC: A deep reinforcement learning approach. 41 - Jing Chen, Meiyi Yang, Junlong Zhu, Mingchuan Zhang, Hongquan Sun, Xu Huang:

Service chain-driven communication and computing integration networking: Architecture, key technologies, use case, and open research trends. 42 - Jamal Alotaibi:

Energy-efficient trust management for secure IoT devices in information-centric wireless sensor networks. 43 - Elavarasi Kumaran, Palani Uthirapathy:

Intelligent Blockchain security for smart cities: Artificial intelligence-based anomaly detection and data integrity. 44 - Linkai Zhu, Shanwen Hu, Zeyu Zhang, Changpu Meng, Lu Liu:

Cross-DNS: Domain resolution with a reputation-driven cross-chain framework for global expansion. 45 - Janosia Banerjee, Shreya Dhoundiyal, Mohona Ghosh, Rashmi Raj, Alongbar Wary:

dashdikpala: A Blockchain-Enabled Lattice Based Access Control Scheme for Digital Evidence Data Protection. 46 - Jiaying Ma, Yongdong Wu, Tong Li, Shishi Huang, Jiao Lu, Weichu Deng, Robert H. Deng:

RF-Chain: A rollback-free inter-shard transaction processing scheme against malicious brokers. 47 - Sonika Bhardwaj, Ramesh Saha:

A secure and scalable traffic management framework using hybrid DNN-CNN and geographic routing in V2X networks. 48 - Vatsala Upadhyay, J. Kokila, Abhishek Vaish:

A dual framework for optimized data storage and retrieval using lightweight python blockchain and scalable smart contracts with IPFS. 49 - Sandeep Srivastava, Deepshikha Agarwal, Brijesh Kumar Chaurasia

:
Proof of Repute Consensus (PoRC): A decentralized approach to blockchain interoperability. 50 - R. Anushiadevi, Veeramuthu Venkatesh, Padmapriya Velupillai Meikandan, S. Aashiq Banu, S. Subashanthini, Dhivya Ravichandran, Rengarajan Amirtharajan:

Separable reversible data hiding in an encrypted image using unaltered adjacent pixels to enhance information security. 51 - Qin Zeng, Dan Qu, Hao Zhang, Yaqi Chen, Wenlin Zhang:

SCNNTraffic: A lightweight and energy-efficient traffic classification method based on spiking convolution neural networks. 52 - Faizal Nujumudeen

, Muhammad Noorul Mubarak, Yogesh Kumar Sharma, Umesh Kumar Lilhore, Sultan Mesfer Aldossary, Shimaa A. Hussien, Ehab Seif Ghith, M. D. Monish Khan:
A hybrid chaos-based cryptographic framework for lightweight IoT security: enhancing efficiency and security in low-power devices. 53

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














