nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adversarial attacks on a lexical sentiment analysis classifier
|
de Oliveira Júnior, Gildásio Antonio |
|
|
174 |
C |
p. 154-171 |
artikel |
2 |
A multi-stage graph based algorithm for survivable Service Function Chain orchestration with backup resource sharing
|
Kibalya, Godfrey |
|
|
174 |
C |
p. 42-60 |
artikel |
3 |
An ensemble approach for optimization of penetration layout in wide area networks
|
Garg, Urvashi |
|
|
174 |
C |
p. 61-74 |
artikel |
4 |
A novel adaptive density-based spatial clustering of application with noise based on bird swarm optimization algorithm
|
Wang, Limin |
|
|
174 |
C |
p. 205-214 |
artikel |
5 |
A secure road condition monitoring scheme in cloud based VANET
|
Baruah, Barnana |
|
|
174 |
C |
p. 131-142 |
artikel |
6 |
Countering radiometric signature exploitation using adversarial machine learning based protocol switching
|
Lalouani, Wassila |
|
|
174 |
C |
p. 109-121 |
artikel |
7 |
DEQLFER — A Deep Extreme Q-Learning Firefly Energy Efficient and high performance routing protocol for underwater communication
|
Anitha, D. |
|
|
174 |
C |
p. 143-153 |
artikel |
8 |
Detection of collaborative misbehaviour in distributed cyber-attacks
|
Thoma, Marios |
|
|
174 |
C |
p. 28-41 |
artikel |
9 |
Developing an asynchronous NoAck-based full-duplex MAC for IEEE 802.11 networks in a systems approach
|
Park, Chang Yun |
|
|
174 |
C |
p. 172-189 |
artikel |
10 |
Editorial Board
|
|
|
|
174 |
C |
p. ii-iii |
artikel |
11 |
HBRSS: Providing high-secure data communication and manipulation in insecure cloud environments
|
Xie, Hui |
|
|
174 |
C |
p. 1-12 |
artikel |
12 |
Internet connected vehicle platoon system modeling and linear stability analysis
|
Zhang, Lidong |
|
|
174 |
C |
p. 92-100 |
artikel |
13 |
Marginal and average weight-enabled data aggregation mechanism for the resource-constrained networks
|
Jan, Syed Roohullah |
|
|
174 |
C |
p. 101-108 |
artikel |
14 |
Multi-criteria handover mobility management in 5G cellular network
|
Palas, Md. Rajibul |
|
|
174 |
C |
p. 81-91 |
artikel |
15 |
Ontology knowledge base combined with Bayesian networks for integrated corridor risk warning
|
Hai, Nan |
|
|
174 |
C |
p. 190-204 |
artikel |
16 |
Quality evaluation of lightweight realistic 3D model based on BIM forward design
|
Chen, Jiao |
|
|
174 |
C |
p. 75-80 |
artikel |
17 |
Quantifying the millimeter wave new radio base stations density for network slicing with prescribed SLAs
|
Koucheryavy, Yevgeni |
|
|
174 |
C |
p. 13-27 |
artikel |
18 |
Social media privacy management strategies: A SEM analysis of user privacy behaviors
|
Chung, Kuo-Cheng |
|
|
174 |
C |
p. 122-130 |
artikel |