nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-based access control and intrusion detection framework for satellite communication systems
|
Cao, Sheng |
|
|
172 |
C |
p. 216-225 |
artikel |
2 |
AdS: An adaptive spectrum sensing technique for survivability under jamming attack in Cognitive Radio Networks
|
Amjad, Muhammad Faisal |
|
|
172 |
C |
p. 25-34 |
artikel |
3 |
Amalgamation of blockchain and IoT for smart cities underlying 6G communication: A comprehensive review
|
Kumari, Aparna |
|
|
172 |
C |
p. 102-118 |
artikel |
4 |
An intelligent parking sharing system for green and smart cities based IoT
|
Said, Adel Mounir |
|
|
172 |
C |
p. 10-18 |
artikel |
5 |
An intelligent work order classification model for government service based on multi-label neural network
|
Huang, Weidong |
|
|
172 |
C |
p. 19-24 |
artikel |
6 |
A security framework for Ethereum smart contracts
|
López Vivar, Antonio |
|
|
172 |
C |
p. 119-129 |
artikel |
7 |
Data tampering attacks diagnosis in dynamic wireless sensor networks
|
Huang, Da-Wen |
|
|
172 |
C |
p. 84-92 |
artikel |
8 |
EdgeSOM: Distributed Hierarchical Edge-driven IoT Data Analytics Framework
|
Bagher, Kassem |
|
|
172 |
C |
p. 64-74 |
artikel |
9 |
Editorial Board
|
|
|
|
172 |
C |
p. ii-iii |
artikel |
10 |
Enhanced network sensitive access control scheme for LTE–LAA/WiFi coexistence: Modeling and performance analysis
|
Saadat, Salman |
|
|
172 |
C |
p. 45-53 |
artikel |
11 |
Exploring active attacks for three incorrect implementations of the ISO/IEC 9798 in satellite networks
|
Zhu, Zhengjia |
|
|
172 |
C |
p. 93-101 |
artikel |
12 |
Generation of realistic cloud access times for mobile application testing using transfer learning
|
Rege, Manoj R. |
|
|
172 |
C |
p. 196-215 |
artikel |
13 |
MECGuard: GRU enhanced attack detection in Mobile Edge Computing environment
|
Liu, Xin |
|
|
172 |
C |
p. 1-9 |
artikel |
14 |
Multi-windowed vertex-frequency analysis for signals on undirected graphs
|
Zheng, Xianwei |
|
|
172 |
C |
p. 35-44 |
artikel |
15 |
Network coding assisted reliable multi-source multicasting over a multi-hop wireless mesh network
|
Rathore, Prateek |
|
|
172 |
C |
p. 130-141 |
artikel |
16 |
Planning Fog networks for time-critical IoT requests
|
Saba, Ume Kalsoom |
|
|
172 |
C |
p. 75-83 |
artikel |
17 |
Providing a CoAP-based technique to get wireless sensor data via IoT gateway
|
Nikseresht, Mohammad Reza |
|
|
172 |
C |
p. 155-168 |
artikel |
18 |
Real-time optimizations in energy profiles and end-to-end delay in WSN using two-hop information
|
Tita, Etobi Damian |
|
|
172 |
C |
p. 169-182 |
artikel |
19 |
Security policies definition and enforcement utilizing policy control function framework in 5G
|
Peinado Gomez, German |
|
|
172 |
C |
p. 226-237 |
artikel |
20 |
Service Differentiation in IEEE 802.11ah WLAN under Restricted Access Window based MAC protocol
|
Sangeetha, U. |
|
|
172 |
C |
p. 142-154 |
artikel |
21 |
Target vehicle lane-change intention detection: An approach based on online transfer learning
|
Zhang, Hailun |
|
|
172 |
C |
p. 54-63 |
artikel |
22 |
Time-predictable routing algorithm for Time-Sensitive Networking: Schedulable guarantee of Time-Triggered streams
|
Chang, Shih-Hung |
|
|
172 |
C |
p. 183-195 |
artikel |