Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             39 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A channel perceiving attack and the countermeasure on long-range IoT physical layer key generation Yang, Lu

191 C p. 108-118
artikel
2 A comprehensive survey on aerial mobile edge computing: Challenges, state-of-the-art, and future directions Song, Zhengyu

191 C p. 233-256
artikel
3 A cross entropy based approach to minimum propagation latency for controller placement in Software Defined Network Chen, Jue

191 C p. 133-144
artikel
4 A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices Kandi, Mohamed Ali

191 C p. 11-25
artikel
5 An improved DECPSOHDV-Hop algorithm for node location of WSN in Cyber–Physical–Social-System Deng, Tan

191 C p. 349-359
artikel
6 A parameter optimization method in predicting algorithms for smart living Li, Xiaohui

191 C p. 315-326
artikel
7 A QoS-aware and channel-aware Radio Resource Management framework for multi-numerology systems Miuccio, Luciano

191 C p. 299-314
artikel
8 A resilient Trust Management framework towards trust related attacks in the Social Internet of Things Magdich, Rim

191 C p. 92-107
artikel
9 A secured and lightweight RFID-tag based authentication protocol with privacy-preserving in Telecare medicine information system Chander, Bhanu

191 C p. 425-437
artikel
10 Automated identification of network anomalies and their causes with interpretable machine learning: The CIAN methodology and TTrees implementation Moulay, Mohamed

191 C p. 327-348
artikel
11 Blockchain based secure and reliable Cyber Physical ecosystem for vaccine supply chain Sreenu, M.

191 C p. 173-183
artikel
12 6Blocks: 6G-enabled trust management scheme for decentralized autonomous vehicles Bhattacharya, Pronaya

191 C p. 53-68
artikel
13 Bridging unlinkability and data utility: Privacy preserving data publication schemes for healthcare informatics Chong, Kah Meng

191 C p. 194-207
artikel
14 Cache-Based Green Distributed Cell Dormancy Technique for Dense Heterogeneous Networks Guo, Wanying

191 C p. 69-77
artikel
15 Cellular automata trust-based energy drainage attack detection and prevention in Wireless Sensor Networks Shahid, Jahanzeb

191 C p. 360-367
artikel
16 CoPaM: Cost-aware VM Placement and Migration for Mobile services in Multi-Cloudlet environment: An SDN-based approach Shahryari, Shirzad

191 C p. 257-273
artikel
17 Deep reinforcement learning based scheduling for minimizing age of information in wireless powered sensor networks Jin, Weiwei

191 C p. 1-10
artikel
18 Detection of cybersecurity spoofing attacks in vehicular networks with recurrence quantification analysis Baldini, Gianmarco

191 C p. 486-499
artikel
19 Editorial Board
191 C p. ii-iii
artikel
20 Efficient resource allocation in 5G URLLC with packet duplication based macro-diversity Khan, Jihas

191 C p. 459-466
artikel
21 Energy-efficient deep-predictive airborne base station selection and power allocation for UAV-assisted wireless networks Dastranj, Parinaz

191 C p. 274-284
artikel
22 Evaluation of HARQ for improved link efficiency within dense IEEE 802.11 networks Afaqui, M. Shahwaiz

191 C p. 217-232
artikel
23 Evolution of network time synchronization towards nanoseconds accuracy: A survey Chefrour, Djalel

191 C p. 26-35
artikel
24 FAM: A frame aggregation based method to infer the load level in IEEE 802.11 networks Bouzouita, Nour El Houda

191 C p. 36-52
artikel
25 FPMBot: Discovering the frequent pattern of IoT-botnet domain queries in large-scale network Qian, Kexiang

191 C p. 378-385
artikel
26 Hidden terminal aware grouping scheme for IEEE 802.11ah based dense IoT networks Mahesh, Miriyala

191 C p. 161-172
artikel
27 Host identification based on self-similarity of network activity Huang, Lisheng

191 C p. 467-476
artikel
28 Hybrid metaheuristic technique for optimal container resource allocation in cloud Alotaibi, Majid

191 C p. 477-485
artikel
29 MFPSE: Multi-user Forward Private Searchable Encryption with dynamic authorization in cloud computing Li, Jianwei

191 C p. 184-193
artikel
30 Multimedia services placement algorithm for cloud–fog hierarchical environments Santos, Fillipe

191 C p. 78-91
artikel
31 NetSentry: A deep learning approach to detecting incipient large-scale network attacks Liu, Haoyu

191 C p. 119-132
artikel
32 NOMA-inspired coexistence enabling method in cell-free massive MIMO using opportunistic interference alignment Khodkar, Zeynab

191 C p. 285-298
artikel
33 Performance evaluation of vehicular Visible Light Communication based on angle-oriented receiver Yahia, Selma

191 C p. 500-509
artikel
34 PWAF : Path Weight Aggregation Feature for link prediction in dynamic networks Kumar, Mukesh

191 C p. 438-458
artikel
35 Recent trends in clustering algorithms for wireless sensor networks: A comprehensive review Al-Sulaifanie, Adnan Ismail

191 C p. 395-424
artikel
36 Recognition of interactive human groups from mobile sensing data Zhu, Weiping

191 C p. 208-216
artikel
37 SecDH: Security of COVID-19 images based on data hiding with PCA Singh, O.P.

191 C p. 368-377
artikel
38 Secure and intelligent slice resource allocation in vehicles-assisted cyber physical systems Cao, Haotong

191 C p. 386-394
artikel
39 Towards optimal positioning and energy-efficient UAV path scheduling in IoT applications Muthanna, Mohammed Saleh Ali

191 C p. 145-160
artikel
                             39 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland