nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A reinforcement learning agent for mixed-numerology interference-aware slice spectrum allocation with non-deterministic and deterministic traffic
|
Zambianco, Marco |
|
|
189 |
C |
p. 100-109 |
artikel |
2 |
Cache management in content delivery networks using the metadata of online social networks
|
Ghasemi, Abdorasoul |
|
|
189 |
C |
p. 11-17 |
artikel |
3 |
Context-aware environment monitoring to support LPWAN-based battlefield applications
|
Zibetti, Guilherme Rotth |
|
|
189 |
C |
p. 18-27 |
artikel |
4 |
Data detection in decentralized and distributed massive MIMO networks
|
Albreem, Mahmoud A. |
|
|
189 |
C |
p. 79-99 |
artikel |
5 |
Design and performance evaluation of QoE/QoS-oriented scheme for reliable data transmission in Internet of Things environments
|
Said, Omar |
|
|
189 |
C |
p. 158-174 |
artikel |
6 |
Device scheduling and channel allocation for energy-efficient Federated Edge Learning
|
Hu, Youqiang |
|
|
189 |
C |
p. 53-66 |
artikel |
7 |
Discovery privacy threats via device de-anonymization in LoRaWAN
|
Spadaccino, Pietro |
|
|
189 |
C |
p. 1-10 |
artikel |
8 |
Dynamic link prediction method of task and user in Mobile Crowd Sensing
|
Wang, Jian |
|
|
189 |
C |
p. 110-119 |
artikel |
9 |
Editorial Board
|
|
|
|
189 |
C |
p. ii-iii |
artikel |
10 |
Extended indirect controller-legacy switch forwarding for link discovery in hybrid multi-controller SDN
|
Hussain, Mir Wajahat |
|
|
189 |
C |
p. 148-157 |
artikel |
11 |
Intelligent deep fusion network for urban traffic flow anomaly identification
|
Djenouri, Youcef |
|
|
189 |
C |
p. 175-181 |
artikel |
12 |
Mitigation of black hole attacks in 6LoWPAN RPL-based Wireless sensor network for cyber physical systems
|
Sharma, Deepak Kumar |
|
|
189 |
C |
p. 182-192 |
artikel |
13 |
“MystifY”: A proactive Moving-Target Defense for a resilient SDN controller in Software Defined CPS
|
Azab, Mohamed |
|
|
189 |
C |
p. 205-220 |
artikel |
14 |
On the properties of device-free multi-point CSI localization and its obfuscation
|
Cominelli, Marco |
|
|
189 |
C |
p. 67-78 |
artikel |
15 |
Source node detection in social networks based on Trust–GMLA algorithm
|
Zhang, Xueqin |
|
|
189 |
C |
p. 28-35 |
artikel |
16 |
State-of-the-art solutions of blockchain technology for data dissemination in smart cities: A comprehensive review
|
Mohd Shari, Nur Fadhilah |
|
|
189 |
C |
p. 120-147 |
artikel |
17 |
Task offloading in vehicular edge computing networks via deep reinforcement learning
|
Karimi, Elham |
|
|
189 |
C |
p. 193-204 |
artikel |
18 |
Towards achieving efficient access control of medical data with both forward and backward secrecy
|
Panda, Suryakanta |
|
|
189 |
C |
p. 36-52 |
artikel |