nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A channel perceiving attack and the countermeasure on long-range IoT physical layer key generation
|
Yang, Lu |
|
|
191 |
C |
p. 108-118 |
artikel |
2 |
A comprehensive survey on aerial mobile edge computing: Challenges, state-of-the-art, and future directions
|
Song, Zhengyu |
|
|
191 |
C |
p. 233-256 |
artikel |
3 |
A cross entropy based approach to minimum propagation latency for controller placement in Software Defined Network
|
Chen, Jue |
|
|
191 |
C |
p. 133-144 |
artikel |
4 |
A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices
|
Kandi, Mohamed Ali |
|
|
191 |
C |
p. 11-25 |
artikel |
5 |
An improved DECPSOHDV-Hop algorithm for node location of WSN in Cyber–Physical–Social-System
|
Deng, Tan |
|
|
191 |
C |
p. 349-359 |
artikel |
6 |
A parameter optimization method in predicting algorithms for smart living
|
Li, Xiaohui |
|
|
191 |
C |
p. 315-326 |
artikel |
7 |
A QoS-aware and channel-aware Radio Resource Management framework for multi-numerology systems
|
Miuccio, Luciano |
|
|
191 |
C |
p. 299-314 |
artikel |
8 |
A resilient Trust Management framework towards trust related attacks in the Social Internet of Things
|
Magdich, Rim |
|
|
191 |
C |
p. 92-107 |
artikel |
9 |
A secured and lightweight RFID-tag based authentication protocol with privacy-preserving in Telecare medicine information system
|
Chander, Bhanu |
|
|
191 |
C |
p. 425-437 |
artikel |
10 |
Automated identification of network anomalies and their causes with interpretable machine learning: The CIAN methodology and TTrees implementation
|
Moulay, Mohamed |
|
|
191 |
C |
p. 327-348 |
artikel |
11 |
Blockchain based secure and reliable Cyber Physical ecosystem for vaccine supply chain
|
Sreenu, M. |
|
|
191 |
C |
p. 173-183 |
artikel |
12 |
6Blocks: 6G-enabled trust management scheme for decentralized autonomous vehicles
|
Bhattacharya, Pronaya |
|
|
191 |
C |
p. 53-68 |
artikel |
13 |
Bridging unlinkability and data utility: Privacy preserving data publication schemes for healthcare informatics
|
Chong, Kah Meng |
|
|
191 |
C |
p. 194-207 |
artikel |
14 |
Cache-Based Green Distributed Cell Dormancy Technique for Dense Heterogeneous Networks
|
Guo, Wanying |
|
|
191 |
C |
p. 69-77 |
artikel |
15 |
Cellular automata trust-based energy drainage attack detection and prevention in Wireless Sensor Networks
|
Shahid, Jahanzeb |
|
|
191 |
C |
p. 360-367 |
artikel |
16 |
CoPaM: Cost-aware VM Placement and Migration for Mobile services in Multi-Cloudlet environment: An SDN-based approach
|
Shahryari, Shirzad |
|
|
191 |
C |
p. 257-273 |
artikel |
17 |
Deep reinforcement learning based scheduling for minimizing age of information in wireless powered sensor networks
|
Jin, Weiwei |
|
|
191 |
C |
p. 1-10 |
artikel |
18 |
Detection of cybersecurity spoofing attacks in vehicular networks with recurrence quantification analysis
|
Baldini, Gianmarco |
|
|
191 |
C |
p. 486-499 |
artikel |
19 |
Editorial Board
|
|
|
|
191 |
C |
p. ii-iii |
artikel |
20 |
Efficient resource allocation in 5G URLLC with packet duplication based macro-diversity
|
Khan, Jihas |
|
|
191 |
C |
p. 459-466 |
artikel |
21 |
Energy-efficient deep-predictive airborne base station selection and power allocation for UAV-assisted wireless networks
|
Dastranj, Parinaz |
|
|
191 |
C |
p. 274-284 |
artikel |
22 |
Evaluation of HARQ for improved link efficiency within dense IEEE 802.11 networks
|
Afaqui, M. Shahwaiz |
|
|
191 |
C |
p. 217-232 |
artikel |
23 |
Evolution of network time synchronization towards nanoseconds accuracy: A survey
|
Chefrour, Djalel |
|
|
191 |
C |
p. 26-35 |
artikel |
24 |
FAM: A frame aggregation based method to infer the load level in IEEE 802.11 networks
|
Bouzouita, Nour El Houda |
|
|
191 |
C |
p. 36-52 |
artikel |
25 |
FPMBot: Discovering the frequent pattern of IoT-botnet domain queries in large-scale network
|
Qian, Kexiang |
|
|
191 |
C |
p. 378-385 |
artikel |
26 |
Hidden terminal aware grouping scheme for IEEE 802.11ah based dense IoT networks
|
Mahesh, Miriyala |
|
|
191 |
C |
p. 161-172 |
artikel |
27 |
Host identification based on self-similarity of network activity
|
Huang, Lisheng |
|
|
191 |
C |
p. 467-476 |
artikel |
28 |
Hybrid metaheuristic technique for optimal container resource allocation in cloud
|
Alotaibi, Majid |
|
|
191 |
C |
p. 477-485 |
artikel |
29 |
MFPSE: Multi-user Forward Private Searchable Encryption with dynamic authorization in cloud computing
|
Li, Jianwei |
|
|
191 |
C |
p. 184-193 |
artikel |
30 |
Multimedia services placement algorithm for cloud–fog hierarchical environments
|
Santos, Fillipe |
|
|
191 |
C |
p. 78-91 |
artikel |
31 |
NetSentry: A deep learning approach to detecting incipient large-scale network attacks
|
Liu, Haoyu |
|
|
191 |
C |
p. 119-132 |
artikel |
32 |
NOMA-inspired coexistence enabling method in cell-free massive MIMO using opportunistic interference alignment
|
Khodkar, Zeynab |
|
|
191 |
C |
p. 285-298 |
artikel |
33 |
Performance evaluation of vehicular Visible Light Communication based on angle-oriented receiver
|
Yahia, Selma |
|
|
191 |
C |
p. 500-509 |
artikel |
34 |
PWAF : Path Weight Aggregation Feature for link prediction in dynamic networks
|
Kumar, Mukesh |
|
|
191 |
C |
p. 438-458 |
artikel |
35 |
Recent trends in clustering algorithms for wireless sensor networks: A comprehensive review
|
Al-Sulaifanie, Adnan Ismail |
|
|
191 |
C |
p. 395-424 |
artikel |
36 |
Recognition of interactive human groups from mobile sensing data
|
Zhu, Weiping |
|
|
191 |
C |
p. 208-216 |
artikel |
37 |
SecDH: Security of COVID-19 images based on data hiding with PCA
|
Singh, O.P. |
|
|
191 |
C |
p. 368-377 |
artikel |
38 |
Secure and intelligent slice resource allocation in vehicles-assisted cyber physical systems
|
Cao, Haotong |
|
|
191 |
C |
p. 386-394 |
artikel |
39 |
Towards optimal positioning and energy-efficient UAV path scheduling in IoT applications
|
Muthanna, Mohammed Saleh Ali |
|
|
191 |
C |
p. 145-160 |
artikel |