scispace - formally typeset
Search or ask a question

Showing papers in "Journal of Network and Computer Applications in 2014"


Journal ArticleDOI
TL;DR: In this article, the authors present aspects related to this field to help researchers and developers to understand and distinguish the main features surrounding VANET in one solid document, without the need to go through other relevant papers and articles.

1,216 citations


Journal ArticleDOI
TL;DR: This paper investigates the properties of trust, proposes objectives of IoT trust management, and provides a survey on the current literature advances towards trustworthy IoT to propose a research model for holistic trust management in IoT.

1,001 citations


Journal ArticleDOI
TL;DR: A taxonomy for vehicular cloud is presented in which special attention has been devoted to the extensive applications, cloud formations, key management, inter cloud communication systems, and broad aspects of privacy and security issues, which found that VCC is a technologically feasible and economically viable technological shifting paradigm for converging intelligent vehicular networks towards autonomous traffic, vehicle control and perception systems.

711 citations


Journal ArticleDOI
TL;DR: This paper focuses on some of the important resource management techniques such as resource provisioning, resource allocation, resource mapping and resource adaptation for IaaS in cloud computing.

517 citations


Journal ArticleDOI
TL;DR: A state-of-the-art and comprehensive survey on clustering approaches in WSNs, which surveys the proposed approaches in the past few years in a classified manner and compares them based on different metrics such as mobility, cluster count, cluster size, and algorithm complexity.

433 citations


Journal ArticleDOI
TL;DR: A systematic approach is proposed in reviewing the state-of-the-art in the field, proposing a classification of mobile tourism RSs and providing insights on their offered services, and highlights challenges and promising research directions with respect to mobile RSs employed in tourism.

405 citations


Journal ArticleDOI
TL;DR: This paper combines all the primary radio user activity models for cognitive radio networks at a single place to provide a single source in the form of survey paper by which a reader can get an idea about which primary radio users activity models have been used in the literature for Cognitive radio networks and how the modeling is performed.

283 citations


Journal ArticleDOI
TL;DR: A survey of state-of-the-art Cloud service selection approaches, which are analyzed from the following five perspectives: decision-making techniques; data representation models; parameters and characteristics of Cloud services; contexts, purposes.

248 citations


Journal ArticleDOI
TL;DR: In this article, the authors discuss the main characteristics and the research challenge of routing in VANETs, which may be considered in designing various routing protocols, and create taxonomy of the current routing protocols for VANets, and surveyed and compared symbolized instances for all the classes of protocols.

231 citations


Journal ArticleDOI
TL;DR: A artefacts were identified that are likely to remain after the use of cloud storage, in the context of the experiments, on a computer hard drive and Apple iPhone3G, and the potential access point(s) for digital forensics examiners to secure evidence.

230 citations


Journal ArticleDOI
TL;DR: This paper proposes an admission control and scheduling mechanism which not only maximizes the resource utilization and profit, but also ensures that the QoS requirements of users are met as specified in SLAs.

Journal ArticleDOI
TL;DR: This survey provides a taxonomy of attack tools in a consistent way for the benefit of network security researchers and discusses pros and cons of such tools and systems for better understanding of their capabilities.

Journal ArticleDOI
TL;DR: The results of the field tests and the simulation studies show that the proposed system can be successfully used in case of disasters to establish an emergency communications system.

Journal ArticleDOI
TL;DR: It is demonstrated that Hadoop has evolved into a solid platform to process large datasets, but the systematic review was able to spot promising areas and suggest topics for future research within the framework.

Journal ArticleDOI
TL;DR: This paper discusses the defining characteristics inherent in mobile malware and shows mobile attack scenarios which are feasible against Homeland Security and proposes a static analysis tool, DroidAnalyzer, which identifies potential vulnerabilities of Android apps and the presence of root exploits.

Journal ArticleDOI
TL;DR: This paper intends to give assistance in the optimization of network lifetime in WSNs, together with offering a guide for the collaboration between W SNs and computational intelligence (CI).

Journal ArticleDOI
TL;DR: This paper considers the problem of grid-based coverage with low-cost and connectivity-guarantee (GCLC) with a novel deployment approach, ACO-Greedy, based on the ant colony optimization with greedy migration mechanism, which can quickly complete the full coverage, and markedly decrease the deployment cost.

Journal ArticleDOI
TL;DR: A novel method for detecting traffic anomalies in a network by exacting and capturing their features in the transform domain by combining network topology information and transform-domain analysis in the given time window and shows that the specious traffic components can be found and identified.

Journal ArticleDOI
TL;DR: A comprehensive survey on the remote data storage auditing in single cloud server domain and a thematic taxonomy of RDA approaches are presented and issues and challenges to current RDA protocols in the cloud and the mobile cloud computing are highlighted.

Journal ArticleDOI
TL;DR: The proposed cooperative-based fuzzy artificial immune system (Co-FAIS) improves detection accuracy and successful defense rate performance against attacks compared to conventional empirical methods.

Journal ArticleDOI
TL;DR: Simulation results show that CMOABC proves to be superior for planning RFID networks compared to NSGA-II and MOABC in terms of optimization accuracy and computation robustness.

Journal ArticleDOI
TL;DR: This study used simulation to change various parameters, such as the number of sensors, angle of view, and sensing radius, in the directional sensor network field to evaluate the efficiency of the proposed algorithm, and further analyzed and compared the improvement results of the overall sensing field coverage ratio.

Journal ArticleDOI
TL;DR: This paper reviews the state-of-the-art for secure WSN routing protocols that illustrates the issues and challenges in the context design matters and proposes the schematic taxonomy of key design issues for WSN routes: basic, essential, and optional.

Journal ArticleDOI
TL;DR: Rich mobile applications (RMAs) comprise a budding research area receiving increasingly abundant attention from the academic and industrial communities as discussed by the authors, and are considered to be a candidate blueprint of future online smartphone applications aiming to deliver high functionalities and rich immersive experience to mobile users.

Journal ArticleDOI
TL;DR: A thorough survey of human mobility issues in three main groups (1) mobility characteristics, (2) mobility models and traces, and (3) mobility prediction techniques is presented.

Journal ArticleDOI
TL;DR: A data centric congestion management protocol using AQM (Active Queue Managements) is proposed for healthcare applications with respect to the inherent characteristics of these applications, which deals with end to end delay, energy consumption, lifetime and fairness.

Journal ArticleDOI
TL;DR: This survey paper provides a discussion of differences between considered mechanisms in terms of scalability, dynamicity, reliability and queries' attributes as well as directions for future research.

Journal ArticleDOI
TL;DR: In this paper, the authors bring out current research efforts on information management techniques employed for safety related applications in VANETs, which includes gathering, aggregation, validation and dissemination, and also provide directions for future research and development.

Journal ArticleDOI
TL;DR: The two-phase aggregation and dynamic aggregator selection of SFEB enable both efficient data gathering and balanced energy consumption and extensive simulations verify the superiority of the SFEB.

Journal ArticleDOI
TL;DR: The purpose of this paper is to assess the strengths and requirements of current volunteer computing platforms, and to enable the research community to study the available schemes used in volunteer computing and help them fill gaps in existing research.