Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             18 results found
no title author magazine year volume issue page(s) type
1 Adversarial attacks on a lexical sentiment analysis classifier de Oliveira Júnior, Gildásio Antonio

174 C p. 154-171
article
2 A multi-stage graph based algorithm for survivable Service Function Chain orchestration with backup resource sharing Kibalya, Godfrey

174 C p. 42-60
article
3 An ensemble approach for optimization of penetration layout in wide area networks Garg, Urvashi

174 C p. 61-74
article
4 A novel adaptive density-based spatial clustering of application with noise based on bird swarm optimization algorithm Wang, Limin

174 C p. 205-214
article
5 A secure road condition monitoring scheme in cloud based VANET Baruah, Barnana

174 C p. 131-142
article
6 Countering radiometric signature exploitation using adversarial machine learning based protocol switching Lalouani, Wassila

174 C p. 109-121
article
7 DEQLFER — A Deep Extreme Q-Learning Firefly Energy Efficient and high performance routing protocol for underwater communication Anitha, D.

174 C p. 143-153
article
8 Detection of collaborative misbehaviour in distributed cyber-attacks Thoma, Marios

174 C p. 28-41
article
9 Developing an asynchronous NoAck-based full-duplex MAC for IEEE 802.11 networks in a systems approach Park, Chang Yun

174 C p. 172-189
article
10 Editorial Board
174 C p. ii-iii
article
11 HBRSS: Providing high-secure data communication and manipulation in insecure cloud environments Xie, Hui

174 C p. 1-12
article
12 Internet connected vehicle platoon system modeling and linear stability analysis Zhang, Lidong

174 C p. 92-100
article
13 Marginal and average weight-enabled data aggregation mechanism for the resource-constrained networks Jan, Syed Roohullah

174 C p. 101-108
article
14 Multi-criteria handover mobility management in 5G cellular network Palas, Md. Rajibul

174 C p. 81-91
article
15 Ontology knowledge base combined with Bayesian networks for integrated corridor risk warning Hai, Nan

174 C p. 190-204
article
16 Quality evaluation of lightweight realistic 3D model based on BIM forward design Chen, Jiao

174 C p. 75-80
article
17 Quantifying the millimeter wave new radio base stations density for network slicing with prescribed SLAs Koucheryavy, Yevgeni

174 C p. 13-27
article
18 Social media privacy management strategies: A SEM analysis of user privacy behaviors Chung, Kuo-Cheng

174 C p. 122-130
article
                             18 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands