nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive repair algorithm for TORA routing protocol based on flood control strategy
|
Liu, Si |
|
|
151 |
C |
p. 437-448 |
artikel |
2 |
A detection mechanism on malicious nodes in IoT
|
Li, Bohan |
|
|
151 |
C |
p. 51-59 |
artikel |
3 |
An Intelligent Swarm Based Prediction Approach For Predicting Cloud Computing User Resource Needs
|
Kholidy, Hisham A. |
|
|
151 |
C |
p. 133-144 |
artikel |
4 |
Anomaly detection in wireless sensor network using machine learning algorithm
|
Poornima, I. Gethzi Ahila |
|
|
151 |
C |
p. 331-337 |
artikel |
5 |
Application of SDN for secure communication in IoT environment
|
N.V., Rajeesh Kumar |
|
|
151 |
C |
p. 60-65 |
artikel |
6 |
A trust management scheme to secure mobile information centric networks
|
Rathee, Geetanjali |
|
|
151 |
C |
p. 66-75 |
artikel |
7 |
Blockchain envisioned UAV networks: Challenges, solutions, and comparisons
|
Mehta, Parimal |
|
|
151 |
C |
p. 518-538 |
artikel |
8 |
Blockchain for Internet of Energy management: Review, solutions, and challenges
|
Miglani, Arzoo |
|
|
151 |
C |
p. 395-418 |
artikel |
9 |
Cloud assisted big data information retrieval system for critical data supervision in disaster regions
|
Wang, Chunmei |
|
|
151 |
C |
p. 548-555 |
artikel |
10 |
Corrigendum to “Generic cost optimized and secured sensitive attribute storage model for template based text document on cloud” [Comput. Commun. 150 (2020) 569–580]
|
M., Sumathi |
|
|
151 |
C |
p. 227 |
artikel |
11 |
Data consistency matrix based data processing model for efficient data storage in wireless sensor networks
|
J., Gokulraj |
|
|
151 |
C |
p. 172-182 |
artikel |
12 |
Decoupling NDN caches via CCndnS: Design, analysis, and application
|
Rezazad, Mostafa |
|
|
151 |
C |
p. 338-354 |
artikel |
13 |
Deep learning and big data technologies for IoT security
|
Amanullah, Mohamed Ahzam |
|
|
151 |
C |
p. 495-517 |
artikel |
14 |
Distributed and scalable computing framework for improving request processing of wearable IoT assisted medical sensors on pervasive computing system
|
Fouad, H. |
|
|
151 |
C |
p. 257-265 |
artikel |
15 |
Dual-load Bloom filter: Application for name lookup
|
Lee, Jungwon |
|
|
151 |
C |
p. 1-9 |
artikel |
16 |
Edge intelligence based Economic Dispatch for Virtual Power Plant in 5G Internet of Energy
|
Fang, Dawei |
|
|
151 |
C |
p. 42-50 |
artikel |
17 |
Editorial Board
|
|
|
|
151 |
C |
p. ii |
artikel |
18 |
Efficient pattern matching algorithm for security and Binary Search Tree (BST) based memory system in Wireless Intrusion Detection System (WIDS)
|
Suresh, P. |
|
|
151 |
C |
p. 111-118 |
artikel |
19 |
Energy aware edge computing: A survey
|
Jiang, Congfeng |
|
|
151 |
C |
p. 556-580 |
artikel |
20 |
Energy efficient network service deployment across multiple SDN domains
|
Zhang, Chuangchuang |
|
|
151 |
C |
p. 449-462 |
artikel |
21 |
Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT
|
Vimal, S. |
|
|
151 |
C |
p. 355-364 |
artikel |
22 |
Evaluating and improving the scalability of RPL security in the Internet of Things
|
Arena, Antonio |
|
|
151 |
C |
p. 119-132 |
artikel |
23 |
Experimental research on real-time acquisition and monitoring of wearable EEG based on TGAM module
|
Yin, Liyong |
|
|
151 |
C |
p. 76-85 |
artikel |
24 |
Fair and efficient resource allocation in IEEE 802.11ah WLAN with heterogeneous data rates
|
Sangeetha, U. |
|
|
151 |
C |
p. 154-164 |
artikel |
25 |
GeoBroker: Leveraging geo-contexts for IoT data distribution
|
Hasenburg, Jonathan |
|
|
151 |
C |
p. 473-484 |
artikel |
26 |
GrowingNet: An end-to-end growing network for semi-supervised learning
|
Zhang, Qifei |
|
|
151 |
C |
p. 208-215 |
artikel |
27 |
Hazard recognition and reliability analysis of CTCS-3 on-board subsystem
|
Shi, Lijuan |
|
|
151 |
C |
p. 145-153 |
artikel |
28 |
Hybridized interference bounded intuitive splitting for smart wearable system using cognitive assisted Internet of Things
|
Altameem, Torki |
|
|
151 |
C |
p. 428-436 |
artikel |
29 |
Improved 1D-CNNs for behavior recognition using wearable sensor network
|
Xu, Zhiou |
|
|
151 |
C |
p. 165-171 |
artikel |
30 |
Improvement and implementation of Wireless Network Topology System based on SNMP protocol for router equipment
|
Wang, Hao |
|
|
151 |
C |
p. 10-18 |
artikel |
31 |
Infective flooding in low-duty-cycle networks, properties and bounds
|
Baldesi, Luca |
|
|
151 |
C |
p. 216-226 |
artikel |
32 |
Intelligent manufacturing production line data monitoring system for industrial internet of things
|
Chen, Wei |
|
|
151 |
C |
p. 31-41 |
artikel |
33 |
Intelligent resource allocation management for vehicles network: An A3C learning approach
|
Chen, Miaojiang |
|
|
151 |
C |
p. 485-494 |
artikel |
34 |
Intelligent software defined network based digital video stabilization system using frame transparency threshold pattern stabilization method
|
S., Kokila |
|
|
151 |
C |
p. 419-427 |
artikel |
35 |
MPLS-based reduction of flow table entries in SDN switches supporting multipath transmission
|
Duliński, Zbigniew |
|
|
151 |
C |
p. 365-385 |
artikel |
36 |
Multi objective task scheduling algorithm based on SLA and processing time suitable for cloud environment
|
Lavanya, M. |
|
|
151 |
C |
p. 183-195 |
artikel |
37 |
Network resource planning for evolvability in software-defined infrastructure
|
Inoue, Koki |
|
|
151 |
C |
p. 247-256 |
artikel |
38 |
Optimization of monitoring network system for Eco safety on Internet of Things platform and environmental food supply chain
|
Xu, Wei |
|
|
151 |
C |
p. 320-330 |
artikel |
39 |
Predicting drug responsiveness with deep learning from the effects on gene expression of Obsessive–Compulsive Disorder affected cases
|
Sekaran, Karthik |
|
|
151 |
C |
p. 386-394 |
artikel |
40 |
Prediction of thermal energy inside smart homes using IoT and classifier ensemble techniques
|
Xu, Hong |
|
|
151 |
C |
p. 581-589 |
artikel |
41 |
Probabilistic routing in wireless networks with privacy guarantees
|
Koh, Jing Yang |
|
|
151 |
C |
p. 228-237 |
artikel |
42 |
Real time energy efficient data aggregation and scheduling scheme for WSN using ATL
|
N., KhadirKumar |
|
|
151 |
C |
p. 202-207 |
artikel |
43 |
Research on intelligent visual image feature region acquisition algorithm in Internet of Things framework
|
Liu, Xin |
|
|
151 |
C |
p. 299-305 |
artikel |
44 |
Research on the optimization of IIoT data processing latency
|
Liu, Weimin |
|
|
151 |
C |
p. 290-298 |
artikel |
45 |
RETRACTED:An assessment of software defined networking approach in surveillance using sparse optimization algorithm
|
Rathish Babu, T.K.S |
|
|
151 |
C |
p. 98-110 |
artikel |
46 |
RRAC: Role based reputed access control method for mitigating malicious impact in intelligent IoT platforms
|
Amoon, Mohammed |
|
|
151 |
C |
p. 238-246 |
artikel |
47 |
Software defined network using enhanced workflow scheduling in surveillance
|
Vuppala, Balaji |
|
|
151 |
C |
p. 196-201 |
artikel |
48 |
Task number maximization offloading strategy seamlessly adapted to UAV scenario
|
Tang, Qiang |
|
|
151 |
C |
p. 19-30 |
artikel |
49 |
Techniques Tanimoto correlated feature selection system and hybridization of clustering and boosting ensemble classification of remote sensed big data for weather forecasting
|
S.B., Pooja |
|
|
151 |
C |
p. 266-274 |
artikel |
50 |
Towards a distributed and infrastructure-less vehicular traffic management system
|
Akabane, Ademar T. |
|
|
151 |
C |
p. 306-319 |
artikel |
51 |
Towards DNA based data security in the cloud computing environment
|
Namasudra, Suyel |
|
|
151 |
C |
p. 539-547 |
artikel |
52 |
Unmanned Aerial vehicle’s runway landing system with efficient target detection by using morphological fusion for military surveillance system
|
Nagarani, N. |
|
|
151 |
C |
p. 463-472 |
artikel |
53 |
VANETomo: A congestion identification and control scheme in connected vehicles using network tomography
|
Paranjothi, Anirudh |
|
|
151 |
C |
p. 275-289 |
artikel |
54 |
Wearable exercise electrocardiograph signal quality assessment based on fuzzy comprehensive evaluation algorithm
|
He, Jiajie |
|
|
151 |
C |
p. 86-97 |
artikel |