Ad-Hoc, Mobile, and Wireless Networks: 19th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2020, Bari, Italy, October 19–21, 2020, Proceedings

[1]  Rachid Benlamri,et al.  Leadership, Innovation and Entrepreneurship as Driving Forces of the Global Economy , 2017 .

[2]  Alec Wolman,et al.  Enabling new mobile applications with location proofs , 2009, HotMobile '09.

[3]  Mach Chen,et al.  Operations, Administration and Maintenance (OAM) for Deterministic Networks (DetNet) , 2019 .

[4]  Bin Li,et al.  UAV Communications for 5G and Beyond: Recent Advances and Future Trends , 2019, IEEE Internet of Things Journal.

[5]  Hiroyuki Morikawa,et al.  Multi-Hop LoRa Networks Enabled by Concurrent Transmission , 2017, IEEE Access.

[6]  H.-J. Zepernick,et al.  Perceptual-based Quality Metrics for Image and Video Services: A Survey , 2007, 2007 Next Generation Internet Networks.

[7]  Michele C. Weigle,et al.  RIH-MAC: Receiver-Initiated Harvesting-aware MAC for NanoNetworks , 2014, NANOCOM' 14.

[8]  Remi Badonnel,et al.  A Study of RPL DODAG Version Attacks , 2014, AIMS.

[9]  Daniele Miorandi,et al.  AUPS: An Open Source AUthenticated Publish/Subscribe system for the Internet of Things , 2016, Inf. Syst..

[10]  Wanlei Zhou,et al.  Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks , 2013, IEEE Transactions on Mobile Computing.

[11]  He Chen,et al.  An adaptive transmission protocol for wireless-powered cooperative communications , 2015, 2015 IEEE International Conference on Communications (ICC).

[12]  Bhanumathi Velusamy,et al.  An Enhanced Channel Access Method to Mitigate the Effect of Interference Among Body Sensor Networks for Smart Healthcare , 2019, IEEE Sensors Journal.

[13]  Ian F. Akyildiz,et al.  Distributed Timely Throughput Optimal Scheduling for the Internet of Nano-Things , 2016, IEEE Internet of Things Journal.

[14]  Xingqin Lin,et al.  The Sky Is Not the Limit: LTE for Unmanned Aerial Vehicles , 2017, IEEE Communications Magazine.

[15]  Sevil Ahmed,et al.  Industrial network design using Low-Power Wide-Area Network , 2017, 2017 4th International Conference on Systems and Informatics (ICSAI).

[16]  Amarsinh Vidhate,et al.  Routing in Delay Tolerant Network , 2016 .

[17]  Srinivasan Keshav,et al.  Very low-cost internet access using KioskNet , 2007, CCRV.

[18]  Balkrishna C. Rao,et al.  Advances in science and technology through frugality , 2017, IEEE Engineering Management Review.

[19]  Avrim Blum,et al.  The Bottleneck , 2021, Monopsony Capitalism.

[20]  Daniele Miorandi,et al.  Internet of Things: Security in the Keys , 2016, Q2SWinet@MSWiM.

[21]  Anders Lindgren,et al.  Revisiting a remote village scenario and its DTN routing objective , 2014, Comput. Commun..

[22]  Giuseppe Piro,et al.  Terahertz electromagnetic field propagation in human tissues: A study on communication capabilities , 2016, Nano Commun. Networks.

[23]  Gianluigi Ferrari,et al.  Wireless Mesh Networking: An IoT-Oriented Perspective Survey on Relevant Technologies , 2019, Future Internet.

[24]  J. Woo,et al.  Normative Data of Handgrip Strength in 26344 Older Adults - A Pooled Dataset from Eight Cohorts in Asia , 2019, The journal of nutrition, health & aging.

[25]  Floriano De Rango,et al.  Energy Aware Epidemic Strategies for Mobile Opportunistic Networks , 2020, ADHOC-NOW.

[26]  Vittoria Musa,et al.  A Lean Control Theoretic Approach to Energy-Harvesting in Diffusion-Based Molecular Communications , 2020, IEEE Communications Letters.

[27]  Sherali Zeadally,et al.  Real-time QoE prediction for multimedia applications in Wireless Mesh Networks , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).

[28]  Pietro Manzoni,et al.  A Low-Cost and Low-Power Messaging System Based on the LoRa Wireless Technology , 2020, Mob. Networks Appl..

[29]  Jeannie R. Albrecht,et al.  Smart * : An Open Data Set and Tools for Enabling Research in Sustainable Homes , 2012 .

[30]  Aravind Srinivasan,et al.  Mobile Data Offloading through Opportunistic Communications and Social Participation , 2012, IEEE Transactions on Mobile Computing.

[31]  Sebastian Canovas-Carrasco,et al.  On the Nature of Energy-Feasible Wireless Nanosensor Networks , 2018, Sensors.

[32]  Sema F. Oktug,et al.  RPL version number attacks: In-depth study , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[33]  Gabriel A. Maia CROSS: loCation pROof techniqueS for consumer mobile applicationS , 2019 .

[34]  Dave Cavalcanti,et al.  Reliable and Available Wireless Technologies , 2020 .

[35]  Utz Roedig,et al.  Do LoRa Low-Power Wide-Area Networks Scale? , 2016, MSWiM.

[36]  Otto Carlos Muniz Bandeira Duarte,et al.  Orchestrating Virtualized Network Functions , 2015, IEEE Transactions on Network and Service Management.

[37]  L. Angrisani,et al.  An Innovative Air Quality Monitoring System based on Drone and IoT Enabling Technologies , 2019, 2019 IEEE International Workshop on Metrology for Agriculture and Forestry (MetroAgriFor).

[38]  Ricardo Neisse,et al.  Enforcement of security policy rules for the Internet of Things , 2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[39]  Christian Bettstetter,et al.  Cooperative Relaying in LoRa Sensor Networks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[40]  Zhi-Hua Zhou,et al.  Tri-training: exploiting unlabeled data using three classifiers , 2005, IEEE Transactions on Knowledge and Data Engineering.

[41]  Michele C. Weigle,et al.  Optimizing Energy Consumption in Terahertz Band Nanonetworks , 2014, IEEE Journal on Selected Areas in Communications.

[42]  Ian F. Akyildiz,et al.  Femtosecond-Long Pulse-Based Modulation for Terahertz Band Communication in Nanonetworks , 2014, IEEE Transactions on Communications.

[43]  Noureddine Moussa,et al.  Statistical study of energy and time costs of fault tolerance in Multilevel and EDCR protocols , 2019, 2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).

[44]  Anju S Pillai,et al.  Fault Tolerance strategies for Wireless Sensor Networks – A Comprehensive Survey , 2018, 2018 3rd International Conference on Inventive Computation Technologies (ICICT).

[45]  Y. Charlie Hu,et al.  Furion: Engineering High-Quality Immersive Virtual Reality on Today's Mobile Devices , 2017, IEEE Transactions on Mobile Computing.

[46]  Thomas Weng,et al.  Occupancy-driven energy management for smart building automation , 2010, BuildSys '10.

[47]  L. Ferrucci,et al.  Short Physical Performance Battery and all-cause mortality: systematic review and meta-analysis , 2016, BMC Medicine.

[48]  Christopher Paolini,et al.  Upper Bound on LoRa Smart Metering Uplink Rate , 2020, 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC).

[49]  Per A. Hallgren,et al.  Location-enhanced Authentication using the IoT , 2016, ACSAC 2016.

[50]  Hannu Tenhunen,et al.  End-to-end security scheme for mobility enabled healthcare Internet of Things , 2016, Future Gener. Comput. Syst..

[51]  Sinem Coleri,et al.  Relay Selection, Scheduling, and Power Control in Wireless-Powered Cooperative Communication Networks , 2020, IEEE Transactions on Wireless Communications.

[52]  Muhammad Omer Farooq,et al.  Introducing Scalability in LoRa-Based Networks through Multi-Hop Communication Setups , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[53]  Daniele Miorandi,et al.  Dynamic Policies in Internet of Things: Enforcement and Synchronization , 2017, IEEE Internet of Things Journal.

[54]  Olivier Flauzac,et al.  A Low Power LoRa-LoRaWan Relay Function with a Single Input, Single Output Device , 2020, EWSN.

[55]  Guohong Cao,et al.  APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services , 2011, 2011 Proceedings IEEE INFOCOM.

[56]  Gianluca Cena,et al.  Evaluating and Modeling IEEE 802.15.4 TSCH Resilience against Wi-Fi Interference in New-Generation Highly-Dependable Wireless Sensor Networks , 2020, Ad Hoc Networks.

[57]  Baojiang Cui,et al.  Detecting Malicious URLs via a Keyword-Based Convolutional Gated-Recurrent-Unit Neural Network , 2019, IEEE Access.

[58]  Isabelle Chrisment,et al.  A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks , 2017, IEEE Transactions on Network and Service Management.

[59]  Zaenab Muslimin,et al.  IoT-based Water Quality Monitoring System for Soft-Shell Crab Farming , 2018, 2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS).

[60]  Hwangnam Kim,et al.  Drone formation algorithm on 3D space for a drone-based network infrastructure , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[61]  Peihua Huang,et al.  Ultrahigh-power micrometre-sized supercapacitors based on onion-like carbon. , 2010, Nature nanotechnology.

[62]  Hao Jiang,et al.  BIER-TE extensions for Packet Replication and Elimination Function (PREF) and OAM , 2018 .

[63]  Antonella Molinaro,et al.  IoT Services Allocation at the Edge via Named Data Networking: From Optimal Bounds to Practical Design , 2019, IEEE Transactions on Network and Service Management.

[64]  Annalisa Socievole,et al.  Routing approaches and performance evaluation in delay tolerant networks , 2011, 2011 Wireless Telecommunications Symposium (WTS).

[65]  Reza Curtmola,et al.  LINK: Location Verification through Immediate Neighbors Knowledge , 2010, MobiQuitous.

[66]  Roberto Morabito,et al.  Distributing Intelligence to the Edge and Beyond , 2019, ArXiv.

[67]  Jianchao Zeng,et al.  Circle Formation Control of Large-Scale Intelligent Swarm Systems in a Distributed Fashion , 2009, ISNN.

[68]  Pascal Thubert,et al.  Meet the PAREO Functions: Towards Reliable and Available Wireless Networks , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).

[69]  Junhee Lee,et al.  Performance analysis of IEEE 802.15.4e DSME MAC protocol under WLAN interference , 2012, 2012 International Conference on ICT Convergence (ICTC).

[70]  Matthias Baldauf,et al.  A survey on context-aware systems , 2007, Int. J. Ad Hoc Ubiquitous Comput..

[71]  Abdennaceur Kachouri,et al.  Elderly monitoring system in a smart city environment using LoRa and MQTT , 2020, IET Wirel. Sens. Syst..

[72]  Fabrice Theoleyre,et al.  Operations, Administration and Maintenance (OAM) features for RAW , 2019 .

[73]  Zhi-Hua Zhou,et al.  Improve Computer-Aided Diagnosis With Machine Learning Techniques Using Undiagnosed Samples , 2007, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[74]  Cauligi S. Raghavendra,et al.  Spray and Focus: Efficient Mobility-Assisted Routing for Heterogeneous and Correlated Mobility , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[75]  Sinem Coleri,et al.  Minimum Length Scheduling for Full Duplex Time-Critical Wireless Powered Communication Networks , 2020, IEEE Transactions on Wireless Communications.

[76]  Michel Barbeau,et al.  Quality Amplification of Error Prone Navigation for Swarms of Micro Aerial Vehicles , 2019, 2019 IEEE Globecom Workshops (GC Wkshps).

[77]  Sergey Andreev,et al.  Flexible and Reliable UAV-Assisted Backhaul Operation in 5G mmWave Cellular Networks , 2018, IEEE Journal on Selected Areas in Communications.

[78]  Jin Suk Chung,et al.  Micro-scale to nano-scale generators for energy harvesting: Self powered piezoelectric, triboelectric and hybrid devices , 2019, Physics Reports.

[79]  Mark A. Hall,et al.  Correlation-based Feature Selection for Machine Learning , 2003 .

[80]  Ian F. Akyildiz,et al.  Channel Modeling and Capacity Analysis for Electromagnetic Wireless Nanonetworks in the Terahertz Band , 2011, IEEE Transactions on Wireless Communications.

[81]  Sebastian Canovas-Carrasco,et al.  A nanoscale communication network scheme and energy model for a human hand scenario , 2018, Nano Commun. Networks.

[82]  Zhong Lin Wang,et al.  Self-powered nanowire devices. , 2010, Nature nanotechnology.

[83]  Jenny Torres,et al.  Cross-site scripting (XSS) attacks and mitigation: A survey , 2020, Comput. Networks.

[84]  Annalisa Socievole,et al.  Routing in Mobile Opportunistic Social Networks with Selfish Nodes , 2019, Wirel. Commun. Mob. Comput..

[85]  Gregor Verbic,et al.  A new dynamic security assessment framework based on semi-supervised learning and data editing , 2019, Electric Power Systems Research.

[86]  Zhi-Hua Zhou,et al.  Disagreement-based Semi-supervised Learning , 2013 .

[87]  Lixia Zhang,et al.  Towards Edge Computing over Named Data Networking , 2018, 2018 IEEE International Conference on Edge Computing (EDGE).

[88]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[89]  Mohamed-Slim Alouini,et al.  FSO-Based Vertical Backhaul/Fronthaul Framework for 5G+ Wireless Networks , 2016, IEEE Communications Magazine.

[90]  Colian Giannini,et al.  Delay Tolerant Network for smart city: Exploiting bus mobility , 2016, 2016 AEIT International Annual Conference (AEIT).

[91]  Adam Wolisz,et al.  Distributed wakeup scheduling scheme for supporting periodic traffic in wsns , 2009, 2009 European Wireless Conference.

[92]  Gianluca Cena,et al.  Energy-Efficient Link Capacity Overprovisioning In Time Slotted Channel Hopping Networks , 2020, 2020 16th IEEE International Conference on Factory Communication Systems (WFCS).

[93]  Nedo Celandroni,et al.  Performance Analysis of Systematic Upper Layer FEC Codes and Interleaving in Land Mobile Satellite Channels , 2011, IEEE Transactions on Vehicular Technology.

[94]  Virender Ranga,et al.  Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review , 2020, IEEE Sensors Journal.

[95]  Rong Yu,et al.  Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles , 2018, IEEE Transactions on Intelligent Transportation Systems.

[96]  Gianluca Cena,et al.  Optimal retransmission allocation for EDF-based networked real-time applications , 2019, 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS).

[97]  Panayotis Antoniadis,et al.  Community Networks and Sustainability: A Survey of Perceptions, Practices, and Proposed Solutions , 2017, IEEE Communications Surveys & Tutorials.

[98]  Hon Sun Chiu,et al.  Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .

[99]  Giuseppe Piro,et al.  An Open Source and System-Level Simulator for the Internet of Drones , 2019, 2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops).

[100]  Cauligi S. Raghavendra,et al.  Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.

[101]  Morten Fjeld,et al.  LabDesignAR: configuring multi-camera motion capture systems in augmented reality , 2017, VRST.

[102]  Gian Paolo Rossi,et al.  Leveraging Bus Mobility to Enable Communications in Urban Areas , 2011, ArXiv.

[103]  Javier de Lope Asiaín,et al.  A Vision-Based Dual Anticipatory/Reactive Control Architecture for Indoor Navigation of an Unmanned Aerial Vehicle Using Visual Topological Maps , 2013, IWINAC.

[104]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[105]  Nadeem Javaid,et al.  Simultaneous Wireless Information and Power Transfer for Buffer-Aided Cooperative Relaying Systems , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[106]  Fred Glover,et al.  Tabu Search: A Tutorial , 1990 .

[107]  Sajal K. Das,et al.  DRIH-MAC: A Distributed Receiver-Initiated Harvesting-Aware MAC for Nanonetworks , 2015, IEEE Transactions on Molecular, Biological and Multi-Scale Communications.

[108]  Pan Hui,et al.  An Energy-Efficient n-Epidemic Routing Protocol for Delay Tolerant Networks , 2010, 2010 IEEE Fifth International Conference on Networking, Architecture, and Storage.

[109]  Augusto Casaca,et al.  An Internet of Things Based Platform for Real-Time Management of Energy Consumption in Water Resource Recovery Facilities , 2018, IFIPIoT@WCC.

[110]  Lars C. Wolf,et al.  DTN routing in urban public transport systems , 2010, CHANTS '10.

[111]  Jacob M. Howe,et al.  Detecting Cross-Site Scripting Attacks Using Machine Learning , 2018, AMLTA.

[112]  Mikael Gidlund,et al.  A Central Intrusion Detection System for RPL-Based Industrial Internet of Things , 2019, 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS).

[113]  Qian Ma,et al.  Multi-Classification for Malicious URL Based on Improved Semi-Supervised Algorithm , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[114]  Qiang Li,et al.  Wireless information and power transfer on cooperative multi-path relay channels , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).

[115]  Floriano De Rango,et al.  Performance evaluation of scalable and energy efficient dynamic n-epidemic routing in Delay Tolerant Networks , 2013, 2013 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS).

[116]  Augusto Ciuffoletti,et al.  Low-Cost IoT: A Holistic Approach , 2018, J. Sens. Actuator Networks.

[117]  Argel A. Bandala,et al.  Swarming Algorithm for Unmanned Aerial Vehicle (UAV) Quadrotors - Swarm Behavior for Aggregation, Foraging, Formation, and Tracking , 2014, J. Adv. Comput. Intell. Intell. Informatics.

[118]  Owen McAree,et al.  Thermal Infrared Imaging from Drones Offers a Major Advance for Spider Monkey Surveys , 2019, Drones.

[119]  Antonio Barrientos,et al.  Mini-quadrotor attitude control based on Hybrid Backstepping & Frenet-Serret theory , 2010, 2010 IEEE International Conference on Robotics and Automation.

[120]  Tarik Taleb,et al.  Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives , 2016, IEEE Internet of Things Journal.

[121]  Marco Zennaro,et al.  Alternative Network Deployments: Taxonomy, Characterization, Technologies, and Architectures , 2016, RFC.

[122]  Ethan Grossman,et al.  Deterministic Networking Use Cases , 2019, RFC.

[123]  Mingzhe Jiang,et al.  Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach , 2018, Future Gener. Comput. Syst..

[124]  Christian F. Tschudin,et al.  Resolution strategies for networking the IoT at the edge via named functions , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[125]  Schahram Dustdar,et al.  EMMA: Distributed QoS-Aware MQTT Middleware for Edge Computing Applications , 2018, 2018 IEEE International Conference on Cloud Engineering (IC2E).

[126]  Jonathan Loo,et al.  The impacts of internal threats towards Routing Protocol for Low power and lossy network performance , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).

[127]  Mingquan Wu,et al.  IPTV Multicast Over Wireless LAN Using Merged Hybrid ARQ With Staggered Adaptive FEC , 2009, IEEE Transactions on Broadcasting.

[128]  Jonathan Loo,et al.  The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.

[129]  Steven C. H. Hoi,et al.  Malicious URL Detection using Machine Learning: A Survey , 2017, ArXiv.

[130]  Yasuyuki Tanaka,et al.  Simulating 6TiSCH networks , 2018, Trans. Emerg. Telecommun. Technol..

[131]  Zhang Ren,et al.  Time-Varying Formation Tracking for Second-Order Multi-Agent Systems Subjected to Switching Topologies With Application to Quadrotor Formation Flying , 2017, IEEE Transactions on Industrial Electronics.

[132]  Dengguo Feng,et al.  Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing , 2005, IACR Cryptol. ePrint Arch..

[133]  Débora C. Muchaluat-Saade,et al.  Context-Aware Routing in Delay and Disruption Tolerant Networks , 2016, Int. J. Wirel. Inf. Networks.

[134]  Xiang Cheng,et al.  Relay Selection in Full-Duplex Energy-Harvesting Two-Way Relay Networks , 2017, IEEE Transactions on Green Communications and Networking.

[135]  Panita Pongpaibool,et al.  Authorization mechanism for MQTT-based Internet of Things , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).

[136]  L. Ferrucci,et al.  A short physical performance battery assessing lower extremity function: association with self-reported disability and prediction of mortality and nursing home admission. , 1994, Journal of gerontology.

[137]  Yun-Pang Flötteröd,et al.  Microscopic Traffic Simulation using SUMO , 2018, 2018 21st International Conference on Intelligent Transportation Systems (ITSC).

[138]  Dharma P. Agrawal,et al.  GPS: Location-Tracking Technology , 2002, Computer.

[139]  Roberto Di Pietro,et al.  CREPUSCOLO: A collusion resistant privacy preserving location verification system , 2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS).

[140]  Craig Hedge,et al.  The Immersive Virtual Environment of the digital fulldome: Considerations of relevant psychological processes , 2012, Int. J. Hum. Comput. Stud..

[141]  Sayan Kumar Ray,et al.  SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..

[142]  Davide Perla,et al.  A LoRa enabled building automation architecture based on MQTT , 2017, 2017 AEIT International Annual Conference.

[143]  David Maxwell Chickering,et al.  Learning Bayesian Networks: The Combination of Knowledge and Statistical Data , 1994, Machine Learning.

[144]  Ian F. Akyildiz,et al.  Energy and spectrum-aware MAC protocol for perpetual wireless nanosensor networks in the Terahertz Band , 2013, Ad Hoc Networks.

[145]  Kevin R. Fall,et al.  A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.

[146]  Xiang Cheng,et al.  Full-Duplex Energy-Harvesting Relay Networks: Capacity-Maximizing Relay Selection , 2018, Journal of Communications and Information Networks.

[147]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SimuTools.

[148]  Mathias Utgård Idle Listening Reduction Mechanism for Overprovisioned Cells in 6TiSCH Tracks , 2019 .

[149]  J. R. Llata,et al.  Working Together: A Review on Safe Human-Robot Collaboration in Industrial Environments , 2017, IEEE Access.

[150]  Tarcisio F. Maciel,et al.  Radio resource allocation framework for quality of experience optimization in wireless networks , 2015, IEEE Network.

[151]  Kai-Hsiang Ke,et al.  Monitoring of Large-Area IoT Sensors Using a LoRa Wireless Mesh Network System: Design and Evaluation , 2018, IEEE Transactions on Instrumentation and Measurement.

[152]  Gianluca Cena,et al.  Comparison of Mixed Diversity Schemes to Enhance Reliability of Wireless Networks , 2019, ADHOC-NOW.

[153]  Giovanni Emanuele Corazza,et al.  Introducing the QEST broker: Scaling the IoT by bridging MQTT and REST , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[154]  Yuanyuan Yang,et al.  Relay Selection and Power Allocation for Cooperative Communication Networks With Energy Harvesting , 2018, IEEE Systems Journal.

[155]  Aria Nosratinia,et al.  Cooperative communication in wireless networks , 2004, IEEE Communications Magazine.

[156]  Fabrice Theoleyre,et al.  Scheduling for IEEE802.15.4-TSCH and slow channel hopping MAC in low power industrial wireless networks: A survey , 2017, Comput. Commun..

[157]  Victor I. Chang,et al.  A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments , 2018, Comput. Secur..

[158]  Nadine Akkari Adra,et al.  Grid Based Energy-Aware MAC Protocol for Wireless Nanosensor Network , 2016, 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS).

[159]  Frank Blumensaat,et al.  Synchronous LoRa Mesh Network to Monitor Processes in Underground Infrastructure , 2019, IEEE Access.

[160]  Henrik Lehrmann Christiansen,et al.  Performance of Non-Orthogonal Multiple Access (NOMA) in mmWave wireless communications for 5G networks , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).

[161]  Yun Zhou,et al.  An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence , 2019, Comput. Secur..

[162]  Jon Crowcroft,et al.  Opportunistic message routing using multi-layer social networks , 2013, HP-MOSys '13.

[163]  H. Tenhunen,et al.  A Survey on LoRa for IoT: Integrating Edge Computing , 2019, 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC).

[164]  Geoffrey Ye Li,et al.  Modulation and Multiple Access for 5G Networks , 2017, IEEE Communications Surveys & Tutorials.

[165]  Christian Timmerer,et al.  A novel monitoring architecture for media services adaptation based on network QoS to perceived QoS mapping , 2008, Signal Image Video Process..

[166]  Chao-Chao Wang,et al.  On the Achievable Throughput of Energy-Harvesting Nanonetworks in the Terahertz Band , 2018, IEEE Sensors Journal.

[167]  Mario Marchese,et al.  IoT Applications and Services in Space Information Networks , 2019, IEEE Wireless Communications.

[168]  Giuseppe Piro,et al.  Experimental Comparison of Industrial Internet of Things Protocol Stacks in Time Slotted Channel Hopping Scenarios , 2018, 2018 IEEE International Conference on Communications (ICC).

[169]  Mohsen Guizani,et al.  Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.

[170]  Manish Kumar,et al.  Overview of Path-Planning and Obstacle Avoidance Algorithms for UAVs: A Comparative Study , 2018, Unmanned Syst..

[171]  Robert J. Hall,et al.  An Internet of Drones , 2016, IEEE Internet Computing.

[172]  J. M. Jornet,et al.  Joint Energy Harvesting and Communication Analysis for Perpetual Wireless Nanosensor Networks in the Terahertz Band , 2012, IEEE Transactions on Nanotechnology.

[173]  Xin-Wei Yao,et al.  ECP: A Probing-Based Error Control Strategy for THz-Based Nanonetworks With Energy Harvesting , 2019, IEEE Access.

[174]  Prabaharan Poornachandran,et al.  ScaleNet: Scalable and Hybrid Frameworkfor Cyber Threat Situational AwarenessBased on DNS, URL, and Email Data Analysis , 2019, J. Cyber Secur. Mobil..

[175]  Yang Chen,et al.  Interactive Correction of Mislabeled Training Data , 2019, 2019 IEEE Conference on Visual Analytics Science and Technology (VAST).

[176]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[177]  Levi Lloyd,et al.  Using Lexical Features for Malicious URL Detection - A Machine Learning Approach , 2019, ArXiv.

[178]  Antonio Franchi,et al.  The flying hand: A formation of UAVs for cooperative aerial tele-manipulation , 2014, 2014 IEEE International Conference on Robotics and Automation (ICRA).

[179]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[180]  Roberto Marani,et al.  Vision-based Assessment of Balance Control in Elderly People , 2020, 2020 IEEE International Symposium on Medical Measurements and Applications (MeMeA).

[181]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[182]  Antonella Molinaro,et al.  NDNe: Enhancing Named Data Networking to Support Cloudification at the Edge , 2016, IEEE Communications Letters.

[183]  Stewart Bryant,et al.  Deterministic Networking (DetNet) Data Plane: IP over IEEE 802.1 Time-Sensitive Networking (TSN) , 2020, RFC.

[184]  Gunasekaran Manogaran,et al.  Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System , 2018 .

[185]  Maurizio Mongelli,et al.  A neural approach to synchronization in wireless networks with heterogeneous sources of noise , 2016, Ad Hoc Networks.

[186]  Abhishek Verma,et al.  Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networks , 2019, Trans. Emerg. Telecommun. Technol..

[187]  Gil Zussman,et al.  On the Analysis of the Bluetooth Time Division Duplex Mechanism , 2007, IEEE Transactions on Wireless Communications.

[188]  Floriano De Rango,et al.  Enhancements of Epidemic Routing in Delay Tolerant Networks from an energy perspective , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[189]  Volker Turau,et al.  New CAP Reduction Mechanisms for IEEE 802.15.4 DSME to Support Fluctuating Traffic in IoT Systems , 2020, ADHOC-NOW.

[190]  Aleksandr Ometov,et al.  Effects of Heterogeneous Mobility on D2D- and Drone-Assisted Mission-Critical MTC in 5G , 2017, IEEE Communications Magazine.

[191]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[192]  Adam Wolisz,et al.  Towards an Affordable Internet Access for Everyone: The Quest for Enabling Universal Service Commitment (Dagstuhl Seminar 14471) , 2014, Dagstuhl Reports.

[193]  Yang Liu,et al.  Survey on computational-intelligence-based UAV path planning , 2018, Knowl. Based Syst..

[194]  Yongdae Kim,et al.  Security Analysis of FHSS-type Drone Controller , 2015, WISA.

[195]  Baojiang Cui,et al.  Malicious URL detection with feature extraction based on machine learning , 2018, Int. J. High Perform. Comput. Netw..

[196]  Xiaofei Wang,et al.  Convergence of Edge Computing and Deep Learning: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[197]  Abhay Shankar Bharadwaj,et al.  IoT based solid waste management system: A conceptual approach with an architectural solution as a smart city application , 2016, 2016 IEEE Annual India Conference (INDICON).

[198]  Vijay Kumar,et al.  Capt: Concurrent assignment and planning of trajectories for multiple robots , 2014, Int. J. Robotics Res..

[199]  S. LaValle Rapidly-exploring random trees : a new tool for path planning , 1998 .

[200]  Lakshminarayanan Subramanian,et al.  Technical Report: Design, Implementation and Deployment of Intermittency-aware Cellular Edge Services for Rural areas , 2016, ArXiv.

[201]  Theodore Tryfonas,et al.  Guard time optimisation and adaptation for energy efficient multi-hop TSCH networks , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[202]  Guevara Noubir,et al.  Security of GPS/INS Based On-road Location Tracking Systems , 2018, 2019 IEEE Symposium on Security and Privacy (SP).

[203]  Adha Imam Cahyadi,et al.  Path planning and formation control via potential function for UAV Quadrotor , 2014, 2014 International Conference on Advanced Robotics and Intelligent Systems (ARIS).

[204]  Yuanchao Shu,et al.  A Practical GPS Location Spoofing Attack in Road Navigation Scenario , 2017, HotMobile.

[205]  Rui L. Aguiar,et al.  Consumer driven information freshness approach for content centric networking , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[206]  Djamal Zeghlache,et al.  A Dynamic Programming Algorithm for Joint VNF Placement and Chaining , 2016, CAN@CoNEXT.

[207]  Giuseppe Piro,et al.  On the design of an energy-harvesting protocol stack for Body Area Nano-NETworks , 2015, Nano Commun. Networks.

[208]  Steven M. LaValle,et al.  Planning algorithms , 2006 .

[209]  Francisco del Pozo,et al.  Analysis of information and communication needs in rural primary health care in developing countries , 2005, IEEE Transactions on Information Technology in Biomedicine.

[210]  Sergei Skorobogatov Flash Memory 'Bumping' Attacks , 2010, CHES.

[211]  Paolo Barsocchi,et al.  Monitoring Ancient Buildings: Real Deployment of an IoT System Enhanced by UAVs and Virtual Reality , 2020, IEEE Access.

[212]  S. Owen,et al.  Effect of intense strength training on standing balance, walking speed, and sit-to-stand performance in older adults. , 2001, The journals of gerontology. Series A, Biological sciences and medical sciences.

[213]  Scott Contini,et al.  Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions , 2006, ASIACRYPT.

[214]  Anders Lindgren,et al.  Probabilistic Routing Protocol for Intermittently Connected Networks , 2012, RFC.

[215]  António Grilo,et al.  LoRaWAN multi-hop uplink extension , 2018, ANT/SEIT.

[216]  Moushumi Sen,et al.  Challenges in deploying a delay tolerant network , 2008, CHANTS '08.

[217]  Scott R. Klemmer,et al.  Integrating Physical and Digital Interactions on Walls for Fluid Design Collaboration , 2008, Hum. Comput. Interact..

[218]  Antoine Gallais,et al.  Thorough IoT testbed characterization: From proof-of-concept to repeatable experimentations , 2017, Comput. Networks.

[219]  Jie Wu,et al.  Geocommunity-Based Broadcasting for Data Dissemination in Mobile Social Networks , 2012 .

[220]  Jon Crowcroft,et al.  ML-SOR: Message routing using multi-layer social networks in opportunistic communications , 2015, Comput. Networks.

[222]  Pascal Thubert An Architecture for IPv6 over the TSCH mode of IEEE 802.15.4 , 2019 .

[223]  Bruce L. Golden,et al.  Optimization approaches for civil applications of unmanned aerial vehicles (UAVs) or aerial drones: A survey , 2018, Networks.

[224]  Jaime Lloret,et al.  A Performance-to-Cost Analysis of IEEE 802.15.4 MAC With 802.15.4e MAC Modes , 2020, IEEE Access.

[225]  Ian H. Witten,et al.  Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.

[226]  Faheem Akhtar,et al.  MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique , 2019, IEEE Access.

[227]  Mostafa H. Ammar,et al.  Mobility as an Alternative Communication Channel: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[228]  Md. Arafatur Rahman,et al.  Enabling drone communications with WiMAX Technology , 2014, IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications.

[229]  David E. Culler,et al.  Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey , 2017, IEEE Communications Surveys & Tutorials.

[230]  Konstantin Böttinger,et al.  Distributed Anomaly Detection of Single Mote Attacks in RPL Networks , 2019, ICETE.

[231]  Henrik Klessig,et al.  Requirements and current solutions of wireless communication in industrial automation , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[232]  Warnakulasuriya Anil Chandana Fernando,et al.  Prediction of perceptual quality for mobile video using fuzzy inference systems , 2015, IEEE Transactions on Consumer Electronics.

[233]  Pietro Cassarà,et al.  Real-Time Multipath Multimedia Traffic in Cellular Networks for Command and Control Applications , 2019, 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall).

[234]  Yisheng Zhong,et al.  Time-Varying Formation Control for Unmanned Aerial Vehicles: Theories and Applications , 2015, IEEE Transactions on Control Systems Technology.

[235]  Hannah Bast,et al.  Sparse map-matching in public transit networks with turn restrictions , 2018, SIGSPATIAL/GIS.

[236]  Daniele Miorandi,et al.  Security towards the edge: Sticky policy enforcement for networked smart objects , 2017, Inf. Syst..

[237]  Thomas R. Gross,et al.  Delay Tolerant Networking for the Socio-Economic Development in Rural South Africa , 2016, GOODTECHS.

[238]  JeongGil Ko,et al.  The Trickle Algorithm , 2011, RFC.

[239]  Stefano Chessa,et al.  UAVs and UAV Swarms for Civilian Applications: Communications and Image Processing in the SCIADRO Project , 2017, WISATS.

[240]  Eduardo Tovar,et al.  DynaMO: dynamically tuning DSME networks , 2020, SIGBED.

[241]  Ismail Ahmedy,et al.  Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol , 2018, IEEE Access.

[242]  Guojun Wang,et al.  Secure VANETs: Trusted Communication Scheme Between Vehicles and Infrastructure Based on Fog Computing , 2019, Studies in Informatics and Control.

[243]  Adam Dunkels,et al.  Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[244]  T. Humphreys STATEMENT ON THE VULNERABILITY OF CIVIL UNMANNED AERIAL VEHICLES AND OTHER SYSTEMS TO CIVIL GPS , 2012 .

[245]  Fernand Meyer,et al.  A comparative study of LPWAN technologies for large-scale IoT deployment , 2019, ICT Express.

[246]  He Chen,et al.  Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications , 2014, IEEE Transactions on Signal Processing.

[247]  Christian Nyberg,et al.  A Routing Protocol for LoRA Mesh Networks , 2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[248]  Dorian Gálvez-López,et al.  Bags of Binary Words for Fast Place Recognition in Image Sequences , 2012, IEEE Transactions on Robotics.

[249]  Xu Zhang,et al.  A Practical Marine Wireless Sensor Network Monitoring System Based on LoRa and MQTT , 2019, 2019 IEEE 2nd International Conference on Electronics Technology (ICET).

[250]  Sushil Jajodia,et al.  Providing secrecy in key management protocols for large wireless sensors networks , 2003, Ad Hoc Networks.

[251]  Yan Liu,et al.  Social-Aware Computing based Congestion Control in Delay Tolerant Networks , 2017, Mob. Networks Appl..

[252]  Alex Pentland,et al.  DakNet: rethinking connectivity in developing nations , 2004, Computer.

[253]  Tao Zhang,et al.  An Efficient and Agile Spatio-Temporal Route Mutation Moving Target Defense Mechanism , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[254]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[255]  Floriano De Rango,et al.  Epidemic Strategies in Delay Tolerant Networks from an Energetic Point of View: Main Issues and Performance Evaluation , 2015, J. Networks.

[256]  Adam Wolisz,et al.  EvalVid - A Framework for Video Transmission and Quality Evaluation , 2003, Computer Performance Evaluation / TOOLS.

[257]  Luigi Alfredo Grieco,et al.  QuakeSense, a LoRa-compliant Earthquake Monitoring Open System , 2019, 2019 IEEE/ACM 23rd International Symposium on Distributed Simulation and Real Time Applications (DS-RT).

[258]  Hanno Wirtz,et al.  Analyzing Metropolitan-Area Networking within Public Transportation Systems for Smart City Applications , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).

[259]  Gianluca Dini,et al.  Key propagation in wireless sensor networks , 2015, Comput. Electr. Eng..

[260]  Volker Turau,et al.  openDSME: Reliable Time-Slotted Multi-Hop Communication for IEEE 802.15.4 , 2019 .

[261]  Qin Wang,et al.  A Realistic Energy Consumption Model for TSCH Networks , 2014, IEEE Sensors Journal.

[262]  F. Javier López-Martínez,et al.  Quality Assessment in 3G/4G Wireless Networks , 2014, Wirel. Pers. Commun..

[263]  Javier de Lope,et al.  Navigation and Self-Semantic Location of Drones in Indoor Environments by Combining the Visual Bug Algorithm and Entropy-Based Vision , 2017, Frontiers Neurorobotics.

[264]  Travis E. Oliphant,et al.  Guide to NumPy , 2015 .

[265]  Alexander L. Wolf,et al.  Content-based publish/subscribe networking and information-centric networking , 2011, ICN '11.

[266]  Miguel L. Pardal,et al.  Witness-Based Location Proofs for Mobile Devices , 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA).

[267]  Geoffrey E. Hinton,et al.  Visualizing Data using t-SNE , 2008 .

[268]  Xu Chen,et al.  In-Edge AI: Intelligentizing Mobile Edge Computing, Caching and Communication by Federated Learning , 2018, IEEE Network.

[269]  Erina Ferro,et al.  Environmental Monitoring for Smart Cities , 2017, IEEE Sensors Journal.

[270]  Thomas Noël,et al.  Importance of Repeatable Setups for Reproducible Experimental Results in IoT , 2016, PE-WASUN@MSWiM.

[271]  Alexander Brem,et al.  Frugal innovation-past, present, and future , 2017, IEEE Engineering Management Review.

[272]  Daniele Miorandi,et al.  A secure and quality-aware prototypical architecture for the Internet of Things , 2016, Inf. Syst..

[273]  Partha Pratim Ray A survey on Internet of Things architectures , 2018, J. King Saud Univ. Comput. Inf. Sci..

[274]  Sergey Gorinsky,et al.  Cost-Effective Multi-Mode Offloading with peer-assisted communications , 2015, Ad Hoc Networks.

[275]  Dan Liu,et al.  An Adaptive Spray and Wait Routing Algorithm Based on Quality of Node in Delay Tolerant Network , 2019, IEEE Access.

[276]  Fabrice Theoleyre,et al.  RAW use cases , 2000 .

[277]  Pan Hui,et al.  BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.

[278]  Abderrezak Rachedi,et al.  A Secure Routing Protocol Based on RPL for Internet of Things , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[279]  Dong Yue,et al.  Decentralized Adaptive Event-Triggered $H_\infty$ Filtering for a Class of Networked Nonlinear Interconnected Systems , 2019, IEEE Transactions on Cybernetics.

[280]  Siddhartha Chauhan,et al.  Cluster Head Failure Detection and Correction Algorithm for WSN , 2018, 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS).

[281]  Twan Basten,et al.  Topology Management and TSCH Scheduling for Low-Latency Convergecast in In-Vehicle WSNs , 2019, IEEE Transactions on Industrial Informatics.

[282]  Pietro Manzoni,et al.  Simulating Opportunistic Networks: Survey and Future Directions , 2017, IEEE Communications Surveys & Tutorials.

[283]  Andrew Malis,et al.  DetNet Data Plane Framework , 2020 .

[284]  Akram Alomainy,et al.  Nano-Communication for Biomedical Applications: A Review on the State-of-the-Art From Physical Layers to Novel Networking Concepts , 2016, IEEE Access.

[285]  Guy Pujolle,et al.  A new approach to realize drone swarm using ad-hoc network , 2017, 2017 16th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).

[286]  Jean Meunier,et al.  Walking gait dataset : point clouds , skeletons and silhouettes Technical Report Number 1379 , 2018 .

[287]  Shrikanth Narayanan,et al.  Environmental Sound Recognition With Time–Frequency Audio Features , 2009, IEEE Transactions on Audio, Speech, and Language Processing.

[288]  Sema F. Oktug,et al.  New lightweight mitigation techniques for RPL version number attacks , 2019, Ad Hoc Networks.

[289]  Roch H. Glitho,et al.  A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges , 2017, IEEE Communications Surveys & Tutorials.

[290]  Adhitya Bhawiyuga,et al.  LoRa-MQTT Gateway Device for Supporting Sensor-to-Cloud Data Transmission in Smart Aquaculture IoT Application , 2019, 2019 International Conference on Sustainable Information Engineering and Technology (SIET).

[291]  Minghui Chen,et al.  Relay Selection for Radio Frequency Energy-Harvesting Wireless Body Area Network With Buffer , 2018, IEEE Internet of Things Journal.

[292]  Mustapha Réda Senouci,et al.  Scheduling Algorithms for IEEE 802.15.4 TSCH Networks: A Survey , 2018, Advances in Computing Systems and Applications.

[293]  Jonathan Loo,et al.  A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..

[294]  Roland Siegwart,et al.  Visual place recognition with probabilistic voting , 2016, 2017 IEEE International Conference on Robotics and Automation (ICRA).

[295]  Wes McKinney,et al.  Data Structures for Statistical Computing in Python , 2010, SciPy.

[296]  Rishipal Singh,et al.  Trajectory planning and optimization for UAV communication: A review , 2020 .

[297]  Ismail Güvenç,et al.  UAV Air-to-Ground Channel Characterization for mmWave Systems , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).

[298]  Xiang Cheng,et al.  Relay Selection in Two-Way Full-Duplex Energy-Harvesting Relay Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[299]  Christian Tschudin,et al.  Named functions and cached computations , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).

[300]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[301]  Yuhui Shi,et al.  ?Hybrid Particle Swarm Optimization and Genetic Algorithm for Multi-UAV Formation Reconfiguration , 2013, IEEE Computational Intelligence Magazine.

[302]  P. Barsocchi,et al.  Experimental video broadcasting in DVB-RCS/S2 with land mobile satellite channel: A reliability issue , 2008, 2008 IEEE International Workshop on Satellite and Space Communications.

[303]  Ulrike Gretzel,et al.  Smart tourism: foundations and developments , 2015, Electronic Markets.

[304]  Halikul Lenando,et al.  EpSoc: Social-Based Epidemic-Based Routing Protocol in Opportunistic Mobile Social Network , 2018, Mob. Inf. Syst..

[305]  Kevin M. Passino,et al.  Swarm Stability and Optimization , 2011 .

[306]  Kenneth G. Paterson,et al.  On the Security of the TLS Protocol: A Systematic Analysis , 2013, IACR Cryptol. ePrint Arch..

[307]  Yang Yang,et al.  Data Offloading for Deadline-Varying Tasks in Mobile Edge Computing , 2018, 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[308]  Xiujian Chou,et al.  High-Performance PZT-Based Stretchable Piezoelectric Nanogenerator , 2018, ACS Sustainable Chemistry & Engineering.

[309]  Yaochu Jin,et al.  Multi-train: A semi-supervised heterogeneous ensemble classifier , 2017, Neurocomputing.

[310]  He Chen,et al.  Distributed Multi-Relay Selection in Accumulate-Then-Forward Energy Harvesting Relay Networks , 2016, IEEE Transactions on Green Communications and Networking.

[311]  Furkan Yusuf Yavuz,et al.  Deep Learning for Detection of Routing Attacks in the Internet of Things , 2018, Int. J. Comput. Intell. Syst..

[312]  Giuseppe Anastasi,et al.  Improving network formation in IEEE 802.15.4e DSME , 2017, Comput. Commun..

[313]  Yu Zhang,et al.  A Survey on Fault Diagnosis in Wireless Sensor Networks , 2018, IEEE Access.

[314]  Kumpati S. Narendra,et al.  Learning automata - an introduction , 1989 .

[315]  Oussama Khatib,et al.  Real-Time Obstacle Avoidance for Manipulators and Mobile Robots , 1985, Autonomous Robot Vehicles.

[316]  Norman W. Finn,et al.  Deterministic Networking Problem Statement , 2019, RFC.

[317]  Peter I. Corke,et al.  Visual Place Recognition: A Survey , 2016, IEEE Transactions on Robotics.

[318]  A. Barabasi,et al.  Taming complexity , 2005 .

[319]  Sridhar Radhakrishnan,et al.  Towards SDN-based fog computing: MQTT broker virtualization for effective and reliable delivery , 2016, 2016 8th International Conference on Communication Systems and Networks (COMSNETS).

[320]  Yimin Zhou,et al.  Robust Drones Formation Control in 5G Wireless Sensor Network Using mmWave , 2018, Wirel. Commun. Mob. Comput..

[321]  Victor-Valeriu Patriciu,et al.  Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment , 2016 .

[322]  Eduardo Tovar,et al.  Worst-case bound analysis for the time-critical MAC behaviors of IEEE 802.15.4e , 2017, 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS).

[323]  Fabrice Theoleyre,et al.  Experimental analysis and characterization of a wireless sensor network environment , 2010, PE-WASUN '10.

[324]  Yang Lu,et al.  Industry 4.0: A survey on technologies, applications and open research issues , 2017, J. Ind. Inf. Integr..

[325]  Lei Yang,et al.  Security and Privacy in the Internet of Things , 2017 .

[326]  Marco Zennaro,et al.  LPWAN Technologies: Emerging Application Characteristics, Requirements, and Design Considerations , 2020, Future Internet.

[327]  Massimiliano Pierobon,et al.  A routing framework for energy harvesting wireless nanosensor networks in the Terahertz Band , 2014, Wirel. Networks.

[328]  Igor Bisio,et al.  Contact graph routing in DTN space networks: overview, enhancements and performance , 2015, IEEE Communications Magazine.

[329]  Junhee Lee,et al.  Performance evaluation of IEEE 802.15.4e DSME MAC protocol for wireless sensor networks , 2012, 2012 The First IEEE Workshop on Enabling Technologies for Smartphone and Internet of Things (ETSIoT).

[330]  Michel Barbeau,et al.  Geocaching-inspired Resilient Path Planning for Drone Swarms , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).