Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             16 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 An efficient flow-based multi-level hybrid intrusion detection system for software-defined networks Latah, Majd

3-4 p. 261-271
artikel
2 A survey of control consistency in Software-Defined Networking Su, Jinshu

3-4 p. 137-152
artikel
3 A trusted recommendation scheme for privacy protection based on federated learning Wang, Yichuan

3-4 p. 218-228
artikel
4 Blockchain-driven anomaly detection framework on edge intelligence Xie, Xueshuo

3-4 p. 171-192
artikel
5 Cooperative abnormal sound event detection in end-edge-cloud orchestrated systems Wang, Jingrong

3-4 p. 158-170
artikel
6 dptCry: an approach to decrypting ransomware WannaCry based on API hooking Cheng, Guang

3-4 p. 207-216
artikel
7 ECAS: an efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks Qin, Zhiguang

3-4 p. 205-217
artikel
8 Editorial of CCF transactions on networking: special issue on intelligence-enabled end-edge-cloud orchestrated computing Ren, Ju

3-4 p. 155-157
artikel
9 Energy efficient broadcast protocol for Underwater Wireless Sensor Networks Touzene, Abderezak

3-4 p. 1-10
artikel
10 Interference-aware lifetime maximization with joint routing and charging in wireless sensor networks Tan, Qi

3-4 p. 188-206
artikel
11 IP backbone traffic behavior characteristic spectrum composing and role mining Zang, Xiaodong

3-4 p. 153-171
artikel
12 Joint virtual middlebox and application placement with bandwidth guarantees in multi-tenant datacenter Wang, Jian

3-4 p. 172-187
artikel
13 Performance analysis of hybrid SAC-OCDMA-OFDM model over free space optical communication Bhanja, Urmila

3-4 p. 272-285
artikel
14 Proof of outsourced encryption: cross verification of security service level agreement Alasmari, Sultan

3-4 p. 229-244
artikel
15 QoE evaluation of dynamic adaptive streaming over HTTP (DASH) with promising transport layer protocols Khan, Koffka

3-4 p. 245-260
artikel
16 Towards fair and efficient task allocation in blockchain-based crowdsourcing Pang, Xiaoyi

3-4 p. 193-204
artikel
                             16 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland