nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A distributed antenna orientation solution for optimizing communications in a fleet of UAVs
|
Grünblatt, Rémy |
|
|
181 |
C |
p. 102-115 |
artikel |
2 |
ADMS: An online attack detection and mitigation system for LDoS attacks via SDN
|
Tang, Dan |
|
|
181 |
C |
p. 454-471 |
artikel |
3 |
AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems
|
Latif, Sohaib A. |
|
|
181 |
C |
p. 274-283 |
artikel |
4 |
Analysis of physical health risk dynamic evaluation system based on sports network technology
|
Chen, Lianzhen |
|
|
181 |
C |
p. 257-266 |
artikel |
5 |
A proactive caching and offloading technique using machine learning for mobile edge computing users
|
Alqahtani, Fayez |
|
|
181 |
C |
p. 224-235 |
artikel |
6 |
A robust and distributed architecture for 5G-enabled networks in the smart blockchain era
|
Deebak, B.D. |
|
|
181 |
C |
p. 293-308 |
artikel |
7 |
A survey on improving the wireless communication with adaptive antenna selection by intelligent method
|
Wu, ChienHsiang |
|
|
181 |
C |
p. 374-403 |
artikel |
8 |
A two-tier Blockchain framework to increase protection and autonomy of smart objects in the IoT
|
Corradini, Enrico |
|
|
181 |
C |
p. 338-356 |
artikel |
9 |
Auction design for cross-edge task offloading in heterogeneous mobile edge clouds
|
Lu, Weifeng |
|
|
181 |
C |
p. 90-101 |
artikel |
10 |
Big data-driven scheduling optimization algorithm for Cyber–Physical Systems based on a cloud platform
|
Niu, Chao |
|
|
181 |
C |
p. 173-181 |
artikel |
11 |
Buffer-loss estimation to address congestion in 6LoWPAN based resource-restricted ‘Internet of Healthcare Things’ network
|
Verma, Himanshu |
|
|
181 |
C |
p. 236-256 |
artikel |
12 |
Certificateless signature schemes in Industrial Internet of Things: A comparative survey
|
Hussain, Saddam |
|
|
181 |
C |
p. 116-131 |
artikel |
13 |
Construction of multi-modal perception model of communicative robot in non-structural cyber physical system environment based on optimized BT-SVM model
|
Zeng, Hui |
|
|
181 |
C |
p. 182-191 |
artikel |
14 |
DeepPlace: Deep reinforcement learning for adaptive flow rule placement in Software-Defined IoT Networks
|
Nguyen, Tri Gia |
|
|
181 |
C |
p. 156-163 |
artikel |
15 |
Design of a location-based opportunistic geographic routing protocol
|
Li, Linqi |
|
|
181 |
C |
p. 357-364 |
artikel |
16 |
Edge-based platoon control
|
Quadri, Christian |
|
|
181 |
C |
p. 17-31 |
artikel |
17 |
Editorial Board
|
|
|
|
181 |
C |
p. ii-iii |
artikel |
18 |
Face detection algorithm based on improved TinyYOLOv3 and attention mechanism
|
Gao, Jiangjin |
|
|
181 |
C |
p. 329-337 |
artikel |
19 |
4G/5G coexistent dynamic spectrum sharing scheme based on dual bargaining game approach
|
Kim, Sungwook |
|
|
181 |
C |
p. 215-223 |
artikel |
20 |
How does the traffic behavior change by using SUMO traffic generation tools
|
Barbecho Bautista, Pablo |
|
|
181 |
C |
p. 1-13 |
artikel |
21 |
Human motion state recognition based on MEMS sensors and Zigbee network
|
Liu, Qing |
|
|
181 |
C |
p. 164-172 |
artikel |
22 |
Learning compatibility knowledge for outfit recommendation with complementary clothing matching
|
Wang, Ruomei |
|
|
181 |
C |
p. 320-328 |
artikel |
23 |
Link and stability-aware adaptive cooperative routing with restricted packets transmission and void-avoidance for underwater acoustic wireless sensor networks
|
Khan, Anwar |
|
|
181 |
C |
p. 428-437 |
artikel |
24 |
Making slotted ALOHA efficient and fair using reinforcement learning
|
Zhang, Molly |
|
|
181 |
C |
p. 58-68 |
artikel |
25 |
Model-free machine learning of wireless SISO/MIMO communications
|
García, Dolores |
|
|
181 |
C |
p. 192-202 |
artikel |
26 |
Multi-algorithm UWB-based localization method for mixed LOS/NLOS environments
|
Djosic, Sandra |
|
|
181 |
C |
p. 365-373 |
artikel |
27 |
NRflex: Enforcing network slicing in 5G New Radio
|
Boutiba, Karim |
|
|
181 |
C |
p. 284-292 |
artikel |
28 |
Optimal caching scheme in D2D networks with multiple robot helpers
|
Lin, Yu |
|
|
181 |
C |
p. 132-142 |
artikel |
29 |
Pairing free asymmetric group key agreement protocol
|
Braeken, An |
|
|
181 |
C |
p. 267-273 |
artikel |
30 |
Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security
|
Gupta, Daya Sagar |
|
|
181 |
C |
p. 69-79 |
artikel |
31 |
Privacy information verification of homomorphic algorithm for aggregated data based on fog layer structure
|
Li, Xin |
|
|
181 |
C |
p. 309-319 |
artikel |
32 |
Quantifying unlinkability in multi-hop wireless networks
|
Manfredi, Victoria Ursula |
|
|
181 |
C |
p. 32-44 |
artikel |
33 |
Real-time cooperative data routing and scheduling in software defined vehicular networks
|
Sudheera, Kalupahana Liyanage Kushan |
|
|
181 |
C |
p. 203-214 |
artikel |
34 |
Reliability evaluation of Markov cyber–physical system oriented to cognition of equipment operating status
|
Zhang, Qin |
|
|
181 |
C |
p. 80-89 |
artikel |
35 |
Rolling bearing fault diagnosis based on wireless sensor network data fusion
|
Hu, Jie |
|
|
181 |
C |
p. 404-411 |
artikel |
36 |
Smart Unmanned Aerial Vehicles as base stations placement to improve the mobile network operations
|
Zhao, Zhongliang |
|
|
181 |
C |
p. 45-57 |
artikel |
37 |
Special Issue on Optimization of Cross-layer Collaborative Resource Allocation for Mobile Edge Computing, Caching and Communication
|
Wan, Shaohua |
|
|
181 |
C |
p. 472-473 |
artikel |
38 |
Special issue on scalable and secure platforms for UAV networks
|
Chiaraviglio, Luca |
|
|
181 |
C |
p. 14-16 |
artikel |
39 |
Special issue on Security and Privacy in Internet of Medical Things
|
Menon, Varun G. |
|
|
181 |
C |
p. 474-476 |
artikel |
40 |
Time-optimal trajectory planning of manipulator with simultaneously searching the optimal path
|
Yu, Xiuli |
|
|
181 |
C |
p. 446-453 |
artikel |
41 |
Towards AI-enabled traffic management in multipath TCP: A survey
|
Siddiqi, Sadia J. |
|
|
181 |
C |
p. 412-427 |
artikel |
42 |
Triad link prediction method based on the evolutionary analysis with IoT in opportunistic social networks
|
Gou, Fangfang |
|
|
181 |
C |
p. 143-155 |
artikel |
43 |
Using XorOffsetTrie for high-performance IPv6 lookup in the backbone network
|
Zhang, Chunyang |
|
|
181 |
C |
p. 438-445 |
artikel |