nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive Flow Rate Control for Network Utility Maximization Subject to QoS Constraints in Wireless Multi-hop Networks
|
Wang, Tao |
|
2017 |
11 |
5 |
p. 881-899 |
artikel |
2 |
Analysis of P2P, IRC and HTTP traffic for botnets detection
|
AsSadhan, Basil |
|
2017 |
11 |
5 |
p. 848-861 |
artikel |
3 |
A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC
|
Xu, Dongqing |
|
2017 |
11 |
5 |
p. 837-847 |
artikel |
4 |
A robust mutual authentication scheme for session initiation protocol with key establishment
|
Sureshkumar, Venkatasamy |
|
2017 |
11 |
5 |
p. 900-916 |
artikel |
5 |
Big program code dissemination scheme for emergency software-define wireless sensor networks
|
Liu, Xiao |
|
2017 |
11 |
5 |
p. 1038-1059 |
artikel |
6 |
Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks
|
Cui, Jie |
|
2017 |
11 |
5 |
p. 1022-1037 |
artikel |
7 |
Distributed correlation model mining from remote sensing big data based on gene expression programming
|
Yang, Lechan |
|
2017 |
11 |
5 |
p. 1000-1011 |
artikel |
8 |
Distribution-aware cache replication for cooperative road side units in VANETs
|
Chen, Fei |
|
2017 |
11 |
5 |
p. 1075-1084 |
artikel |
9 |
Dynamic power allocation based on second-order control system in two-tier femtocell networks
|
Yuan, Yazhou |
|
2017 |
11 |
5 |
p. 940-954 |
artikel |
10 |
Efficient steganographer detection over social networks with sampling reconstruction
|
Li, Fengyong |
|
2017 |
11 |
5 |
p. 924-939 |
artikel |
11 |
Energy balancing RPL protocol with multipath for wireless sensor networks
|
Wang, Zhenfei |
|
2017 |
11 |
5 |
p. 1085-1100 |
artikel |
12 |
EOABS: expressive outsourced attribute-based signature
|
Mo, Ruo |
|
2017 |
11 |
5 |
p. 979-988 |
artikel |
13 |
FGDA: Fine-grained data analysis in privacy-preserving smart grid communications
|
Ge, Shanshan |
|
2017 |
11 |
5 |
p. 966-978 |
artikel |
14 |
FTLLS: A fault tolerant, low latency, distributed scheduling approach based on sparrow
|
Li, Wenzhuo |
|
2017 |
11 |
5 |
p. 1129-1140 |
artikel |
15 |
Guest editorial: Special issue on big data networking
|
Liao, Xiaofei |
|
2018 |
11 |
5 |
p. 989-991 |
artikel |
16 |
Key frame extraction scheme based on sliding window and features
|
Yu, Linchen |
|
2017 |
11 |
5 |
p. 1141-1152 |
artikel |
17 |
Migrating big video data to cloud: a peer-assisted approach for VoD
|
Chen, Fei |
|
2017 |
11 |
5 |
p. 1060-1074 |
artikel |
18 |
NWBBMP: a novel weight-based buffer management policy for DTN routing protocols
|
Wang, Hezhe |
|
2017 |
11 |
5 |
p. 917-923 |
artikel |
19 |
Optimizing power consumption of mobile devices for video streaming over 4G LTE networks
|
Zhang, Jingyu |
|
2017 |
11 |
5 |
p. 1101-1114 |
artikel |
20 |
Rumor spreading in interdependent social networks
|
Han, Qiyi |
|
2017 |
11 |
5 |
p. 955-965 |
artikel |
21 |
Secure and private key management scheme in big data networking
|
Fan, Kai |
|
2017 |
11 |
5 |
p. 992-999 |
artikel |
22 |
SEIP: Secure and seamless IP communications for group-oriented machine to machine communications
|
Lai, Chengzhe |
|
2017 |
11 |
5 |
p. 821-836 |
artikel |
23 |
Self-adaptive bat algorithm for large scale cloud manufacturing service composition
|
Xu, Bin |
|
2017 |
11 |
5 |
p. 1115-1128 |
artikel |
24 |
Training deep neural network on multiple GPUs with a model averaging method
|
Yao, Qiongjie |
|
2017 |
11 |
5 |
p. 1012-1021 |
artikel |
25 |
Trust-based service composition and selection in service oriented architecture
|
Guo, Jing-Jing |
|
2017 |
11 |
5 |
p. 862-880 |
artikel |