nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive learning of aggregate analytics under dynamic workloads
|
Savva, Fotis |
|
|
109 |
C |
p. 317-330 |
artikel |
2 |
A game-theoretic approach for cost-aware load balancing in distributed systems
|
Kishor, Avadh |
|
|
109 |
C |
p. 29-44 |
artikel |
3 |
A hybrid analysis of LBSN data to early detect anomalies in crowd dynamics
|
Redondo, Rebeca P. Díaz |
|
|
109 |
C |
p. 83-94 |
artikel |
4 |
A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks
|
Nanda, Ashish |
|
|
109 |
C |
p. 521-530 |
artikel |
5 |
A hybrid model-free approach for the near-optimal intrusion response control of non-stationary systems
|
Iannucci, Stefano |
|
|
109 |
C |
p. 111-124 |
artikel |
6 |
A knowledge-based deep learning method for ECG signal delineation
|
Wang, Jilong |
|
|
109 |
C |
p. 56-66 |
artikel |
7 |
A methodology for conducting efficient sanitization of HTTP training datasets
|
Díaz-Verdejo, Jesús E. |
|
|
109 |
C |
p. 67-82 |
artikel |
8 |
A methodology for the design and deployment of distributed cyber–physical systems for smart environments
|
Tanganelli, Giacomo |
|
|
109 |
C |
p. 420-430 |
artikel |
9 |
An accurate and efficient web service QoS prediction model with wide-range awareness
|
Chen, Zhen |
|
|
109 |
C |
p. 275-292 |
artikel |
10 |
Analysis of healthcare big data
|
Lv, Zhihan |
|
|
109 |
C |
p. 103-110 |
artikel |
11 |
An effective random statistical method for Indoor Positioning System using WiFi fingerprinting
|
Ninh, Duong Bao |
|
|
109 |
C |
p. 238-248 |
artikel |
12 |
An efficient data integrity auditing protocol for cloud computing
|
Garg, Neenu |
|
|
109 |
C |
p. 306-316 |
artikel |
13 |
A network-based method with privacy-preserving for identifying influential providers in large healthcare service systems
|
Qi, Xiaoyu |
|
|
109 |
C |
p. 293-305 |
artikel |
14 |
A new approach in reject inference of using ensemble learning based on global semi-supervised framework
|
Liu, Yan |
|
|
109 |
C |
p. 382-391 |
artikel |
15 |
A novel trust mechanism based on Fog Computing in Sensor–Cloud System
|
Wang, Tian |
|
|
109 |
C |
p. 573-582 |
artikel |
16 |
A parallelized disjunctive query based searchable encryption scheme for big data
|
Tahir, Shahzaib |
|
|
109 |
C |
p. 583-592 |
artikel |
17 |
Automated classification of social network messages into Smart Cities dimensions
|
Bencke, Luciana |
|
|
109 |
C |
p. 218-237 |
artikel |
18 |
Big Data Analytics and Artificial Intelligence for Cyber Crime Investigation and Prevention
|
Shalaginov, Andrii |
|
|
109 |
C |
p. 702-703 |
artikel |
19 |
Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme
|
Bian, Weixin |
|
|
109 |
C |
p. 45-55 |
artikel |
20 |
CCoDaMiC: A framework for Coherent Coordination of Data Migration and Computation platforms
|
Dehury, Chinmaya Kumar |
|
|
109 |
C |
p. 1-16 |
artikel |
21 |
Cloud toolkit for Provider assessment, optimized Application Cloudification and deployment on IaaS
|
Psychas, A. |
|
|
109 |
C |
p. 657-667 |
artikel |
22 |
Cognitive-inspired Computing: Advances and Novel Applications
|
Zhu, Rongbo |
|
|
109 |
C |
p. 706-709 |
artikel |
23 |
Community-Centric Brokerage-Aware Access Control for Online Social Networks
|
Asim, Yousra |
|
|
109 |
C |
p. 469-478 |
artikel |
24 |
Content-based multi-source encrypted image retrieval in clouds with privacy preservation
|
Shen, Meng |
|
|
109 |
C |
p. 621-632 |
artikel |
25 |
Deep reinforcement learning for traffic signal control under disturbances: A case study on Sunway city, Malaysia
|
Rasheed, Faizan |
|
|
109 |
C |
p. 431-445 |
artikel |
26 |
Designing an efficient clustering strategy for combined Fog-to-Cloud scenarios
|
Asensio, A. |
|
|
109 |
C |
p. 392-406 |
artikel |
27 |
Desynchronization in distributed Ant Colony Optimization in HPC environment
|
Starzec, Mateusz |
|
|
109 |
C |
p. 125-133 |
artikel |
28 |
Detection of time series patterns and periodicity of cloud computing workloads
|
St-Onge, Cédric |
|
|
109 |
C |
p. 249-261 |
artikel |
29 |
Economic feasibility of virtual operators in 5G via network slicing
|
Sacoto-Cabrera, Erwin J. |
|
|
109 |
C |
p. 172-187 |
artikel |
30 |
Editorial Board
|
|
|
|
109 |
C |
p. ii |
artikel |
31 |
Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities
|
Shen, Jian |
|
|
109 |
C |
p. 450-456 |
artikel |
32 |
Enhancing performance of IoT applications with load prediction and cloud elasticity
|
da Rosa Righi, Rodrigo |
|
|
109 |
C |
p. 689-701 |
artikel |
33 |
Feature data processing: Making medical data fit deep neural networks
|
Xu, Yingying |
|
|
109 |
C |
p. 149-157 |
artikel |
34 |
Find my trustworthy fogs: A fuzzy-based trust evaluation framework
|
Rahman, Fatin Hamadah |
|
|
109 |
C |
p. 562-572 |
artikel |
35 |
Fine-grained access control based on Trusted Execution Environment
|
Fan, Yongkai |
|
|
109 |
C |
p. 551-561 |
artikel |
36 |
Grouping sentences as better language unit for extractive text summarization
|
Cao, Mengyun |
|
|
109 |
C |
p. 331-359 |
artikel |
37 |
G-SEAP: Analyzing and characterizing soft-error aware approximation in GPGPUs
|
Wei, Xiaohui |
|
|
109 |
C |
p. 262-274 |
artikel |
38 |
Hidden the true identity and dating characteristics based on quick private matching in mobile social networks
|
Luo, Entao |
|
|
109 |
C |
p. 633-641 |
artikel |
39 |
iFlask: Isolate flask security system from dangerous execution environment by using ARM TrustZone
|
Zhang, Diming |
|
|
109 |
C |
p. 531-537 |
artikel |
40 |
IoMT-based computational approach for detecting brain tumor
|
Khan, Shah Rukh |
|
|
109 |
C |
p. 360-367 |
artikel |
41 |
IoT-BSFCAN: A smart context-aware system in IoT-Cloud using mobile-fogging
|
Deebak, B.D. |
|
|
109 |
C |
p. 368-381 |
artikel |
42 |
IoT device location information storage system based on blockchain
|
Li, Defeng |
|
|
109 |
C |
p. 95-102 |
artikel |
43 |
MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases
|
Jahan, Sharmin |
|
|
109 |
C |
p. 197-209 |
artikel |
44 |
Mission possible: Unify HPC and Big Data stacks towards application-defined blobs at the storage layer
|
Matri, Pierre |
|
|
109 |
C |
p. 668-677 |
artikel |
45 |
MobiGyges: A mobile hidden volume for preventing data loss, improving storage utilization, and avoiding device reboot
|
Feng, Wendi |
|
|
109 |
C |
p. 158-171 |
artikel |
46 |
MR-I MaxMin-scalable two-phase border based knowledge hiding technique using MapReduce
|
Sharma, Shivani |
|
|
109 |
C |
p. 538-550 |
artikel |
47 |
On Byzantine fault tolerance in multi-master Kubernetes clusters
|
Diouf, Gor Mack |
|
|
109 |
C |
p. 407-419 |
artikel |
48 |
Optimization of privacy-utility trade-offs under informational self-determination
|
Asikis, Thomas |
|
|
109 |
C |
p. 488-499 |
artikel |
49 |
Path prediction in IoT systems through Markov Chain algorithm
|
Piccialli, Francesco |
|
|
109 |
C |
p. 210-217 |
artikel |
50 |
Petri net-based methods for analyzing structural security in e-commerce business processes
|
Yu, Wangyang |
|
|
109 |
C |
p. 611-620 |
artikel |
51 |
Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control
|
Liu, Meng |
|
|
109 |
C |
p. 457-468 |
artikel |
52 |
Private collaborative filtering under untrusted recommender server
|
Xiong, Ping |
|
|
109 |
C |
p. 511-520 |
artikel |
53 |
QASEC: A secured data communication scheme for mobile Ad-hoc networks
|
Usman, Muhammad |
|
|
109 |
C |
p. 604-610 |
artikel |
54 |
Seamless computing in industrial systems using container orchestration
|
Gogouvitis, Spyridon V. |
|
|
109 |
C |
p. 678-688 |
artikel |
55 |
Security in Cognitive Radio Network: Defense against Primary User Emulation attacks using Genetic Artificial Bee Colony (GABC) algorithm
|
Elghamrawy, Sally M. |
|
|
109 |
C |
p. 479-487 |
artikel |
56 |
Security, Trust and Privacy in Cyber (STPCyber): Future trends and challenges
|
Nanda, Priyadarsi |
|
|
109 |
C |
p. 446-449 |
artikel |
57 |
Sleep staging by bidirectional long short-term memory convolution neural network
|
Chen, Xueyan |
|
|
109 |
C |
p. 188-196 |
artikel |
58 |
Smart heating in collaborative and reasoning-enabled housing units
|
Bourelos, P. |
|
|
109 |
C |
p. 644-656 |
artikel |
59 |
Smart vehicle forensics: Challenges and case study
|
Le-Khac, Nhien-An |
|
|
109 |
C |
p. 500-510 |
artikel |
60 |
SneakLeak+: Large-scale klepto apps analysis
|
Bhandari, Shweta |
|
|
109 |
C |
p. 593-603 |
artikel |
61 |
Special Issue: Intelligent Edge, Fog and Internet of Things (IoT)-based Services
|
Enokido, Tomoya |
|
|
109 |
C |
p. 710-711 |
artikel |
62 |
Special Issue on Fog and Cloud Computing for Cooperative Information System Management: Challenges and Opportunities
|
Gaaloul, Walid |
|
|
109 |
C |
p. 704-705 |
artikel |
63 |
Special Issue on High Performance Services Computing and Internet Technologies
|
Tserpes, Konstantinos |
|
|
109 |
C |
p. 642-643 |
artikel |
64 |
System delay optimization for Mobile Edge Computing
|
Xiao, Surong |
|
|
109 |
C |
p. 17-28 |
artikel |
65 |
Task optimization and scheduling of distributed cyber–physical system based on improved ant colony algorithm
|
Yi, Na |
|
|
109 |
C |
p. 134-148 |
artikel |