nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A differential privacy-based classification system for edge computing in IoT
|
Xue, Wanli |
|
|
182 |
C |
p. 117-128 |
artikel |
2 |
An improving approach to analyzing change impact of C programs
|
Dai, Peng |
|
|
182 |
C |
p. 60-71 |
artikel |
3 |
A novel proactive controller deployment protocol for 5G-enabled software-defined Vehicular Networks
|
Aljeri, Noura |
|
|
182 |
C |
p. 88-97 |
artikel |
4 |
Blockchain technology as a Fog computing security and privacy solution: An overview
|
Alzoubi, Yehia Ibrahim |
|
|
182 |
C |
p. 129-152 |
artikel |
5 |
Bounded delay scheduling with packet dependencies
|
Markovitch, Michael |
|
|
182 |
C |
p. 98-109 |
artikel |
6 |
Edge computing-empowered task offloading in PLC-wireless integrated network based on matching with quota
|
Shi, Zhan |
|
|
182 |
C |
p. 110-116 |
artikel |
7 |
Editorial Board
|
|
|
|
182 |
C |
p. ii-iii |
artikel |
8 |
Efficient and reliable hybrid deep learning-enabled model for congestion control in 5G/6G networks
|
Khan, Sulaiman |
|
|
182 |
C |
p. 31-40 |
artikel |
9 |
Efficient failure recovery techniques for segment-routed networks
|
Anbiah, Anix |
|
|
182 |
C |
p. 1-12 |
artikel |
10 |
Energy consumption model for data transfer in smartphone
|
Ali, Jameel |
|
|
182 |
C |
p. 13-21 |
artikel |
11 |
Fast controlling of rumors with limited cost in social networks
|
Yao, Xiaopeng |
|
|
182 |
C |
p. 41-51 |
artikel |
12 |
Green traffic backhauling in next generation wireless communication networks incorporating FSO/mmWave technologies
|
Mowla, Md Munjure |
|
|
182 |
C |
p. 223-237 |
artikel |
13 |
LSTM-MFCN: A time series classifier based on multi-scale spatial–temporal features
|
Zhao, Liang |
|
|
182 |
C |
p. 52-59 |
artikel |
14 |
Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN
|
Shah, Sayed Qaiser Ali |
|
|
182 |
C |
p. 198-211 |
artikel |
15 |
On-the-fly (D)DoS attack mitigation in SDN using Deep Neural Network-based rate limiting
|
El Kamel, Ali |
|
|
182 |
C |
p. 153-169 |
artikel |
16 |
Protocol Reverse-Engineering Methods and Tools: A Survey
|
Huang, Yuyao |
|
|
182 |
C |
p. 238-254 |
artikel |
17 |
Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service
|
Lu, Yanrong |
|
|
182 |
C |
p. 22-30 |
artikel |
18 |
SAAS parallel task scheduling based on cloud service flow load algorithm
|
Zhu, Jian |
|
|
182 |
C |
p. 170-183 |
artikel |
19 |
Socio-economic factor analysis for sustainable and smart precision agriculture: An ensemble learning approach
|
Dash, Pandit Byomakesha |
|
|
182 |
C |
p. 72-87 |
artikel |
20 |
Two-phase sample average approximation for video distribution strategy of edge computing in heterogeneous network
|
Lu, Jingfu |
|
|
182 |
C |
p. 255-267 |
artikel |
21 |
Unsatisfied today, satisfied tomorrow: A simulation framework for performance evaluation of crowdsourcing-based network monitoring
|
Pimpinella, Andrea |
|
|
182 |
C |
p. 184-197 |
artikel |
22 |
ZM-CTC: Covert timing channel construction method based on zigzag matrix
|
Zheng, Jiamin |
|
|
182 |
C |
p. 212-222 |
artikel |