nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A full-duplex MAC technique to improve spectrum-efficiency on 5G mobile wireless networks
|
Guimarães, Lucas de Melo |
|
|
166 |
C |
p. 216-225 |
artikel |
2 |
Air–Ground Surveillance Sensor Network based on edge computing for target tracking
|
Deng, Xiaoheng |
|
|
166 |
C |
p. 254-261 |
artikel |
3 |
Analysis of backlog and delay in downlink power-domain non-orthogonal multiple access wireless networks
|
Chen, Yunpei |
|
|
166 |
C |
p. 26-39 |
artikel |
4 |
An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks
|
Kumar, Prabhat |
|
|
166 |
C |
p. 110-124 |
artikel |
5 |
A privacy and session key based authentication scheme for medical IoT networks
|
Kumar, Pankaj |
|
|
166 |
C |
p. 154-164 |
artikel |
6 |
A provably secure authentication scheme for RFID-enabled UAV applications
|
Gope, Prosanta |
|
|
166 |
C |
p. 19-25 |
artikel |
7 |
A rapid coarse-grained blind wideband spectrum sensing method for cognitive radio networks
|
Feng, Peng |
|
|
166 |
C |
p. 234-243 |
artikel |
8 |
Class consistent and joint group sparse representation model for image classification in Internet of Medical Things
|
Gao, Zan |
|
|
166 |
C |
p. 57-65 |
artikel |
9 |
Combined diffusion approximation–simulation model of AQM’s transient behavior
|
Marek, Dariusz |
|
|
166 |
C |
p. 40-48 |
artikel |
10 |
Designing the Tactile Support Engine to assist time-critical applications at the edge of a 5G network
|
Grasso, Christian |
|
|
166 |
C |
p. 226-233 |
artikel |
11 |
Do we need a contact tracing app?
|
Maccari, Leonardo |
|
|
166 |
C |
p. 9-18 |
artikel |
12 |
Dynamic path planning for unmanned surface vehicle in complex offshore areas based on hybrid algorithm
|
Wang, Zheng |
|
|
166 |
C |
p. 49-56 |
artikel |
13 |
Edge computing assisted privacy-preserving data computation for IoT devices
|
sun, Gaofei |
|
|
166 |
C |
p. 208-215 |
artikel |
14 |
Editorial Board
|
|
|
|
166 |
C |
p. ii-iii |
artikel |
15 |
Energy-efficient computation offloading for vehicular edge computing networks
|
Gu, Xiaohui |
|
|
166 |
C |
p. 244-253 |
artikel |
16 |
Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication
|
Zhang, Yinghui |
|
|
166 |
C |
p. 165-173 |
artikel |
17 |
Improving transaction success rate in cryptocurrency payment channel networks
|
Mercan, Suat |
|
|
166 |
C |
p. 196-207 |
artikel |
18 |
Industrial Internet of Things and its Applications in Industry 4.0: State of The Art
|
Malik, Praveen Kumar |
|
|
166 |
C |
p. 125-139 |
artikel |
19 |
Long-term optimization for MEC-enabled HetNets with device–edge–cloud collaboration
|
Chen, Long |
|
|
166 |
C |
p. 66-80 |
artikel |
20 |
Mobile network traffic pattern classification with incomplete a priori information
|
Jin, Zhiping |
|
|
166 |
C |
p. 262-270 |
artikel |
21 |
Pricing-based interference management scheme in LTE-V2V communication with imperfect channel state information
|
Liu, Zhixin |
|
|
166 |
C |
p. 81-90 |
artikel |
22 |
Privacy-preserving compression model for efficient IoMT ECG sharing
|
Ibaida, Ayman |
|
|
166 |
C |
p. 1-8 |
artikel |
23 |
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment
|
Bera, Basudeb |
|
|
166 |
C |
p. 91-109 |
artikel |
24 |
Role recommender-RBAC: Optimizing user-role assignments in RBAC
|
Rao, K. Rajesh |
|
|
166 |
C |
p. 140-153 |
artikel |
25 |
Stochastic geometry approach towards interference management and control in cognitive radio network: A survey
|
Okegbile, Samuel D. |
|
|
166 |
C |
p. 174-195 |
artikel |