nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Binary Gray Wolf Optimization algorithm for deployment of Virtual Network Functions in 5G hybrid cloud
|
Shahjalal, Mohammad |
|
|
193 |
C |
p. 63-74 |
artikel |
2 |
Adaptive task offloading of rechargeable UAV edge computing network based on double decision value iteration
|
Pan, Wenbin |
|
|
193 |
C |
p. 136-145 |
artikel |
3 |
A Hadamard walk model and its application in identification of important edges in complex networks
|
Liang, Wen |
|
|
193 |
C |
p. 378-387 |
artikel |
4 |
Analysis of a Multi-Armed Bandit solution to improve the spatial reuse of next-generation WLANs
|
Bardou, Anthony |
|
|
193 |
C |
p. 279-292 |
artikel |
5 |
Analysis of time-weighted LoRa-based positioning using machine learning
|
Anjum, Mahnoor |
|
|
193 |
C |
p. 266-278 |
artikel |
6 |
An early stage convolutional feature extracting method using for mining traffic detection
|
Sun, Peifa |
|
|
193 |
C |
p. 346-354 |
artikel |
7 |
A path characteristics based adaptive subflow switching algorithm for dynamic heterogeneous MPTCP network
|
Cai, Yantao |
|
|
193 |
C |
p. 204-213 |
artikel |
8 |
ARCMT: Anchor node-based range free cooperative multi trusted secure underwater localization using fuzzifier
|
Saha, Souvik |
|
|
193 |
C |
p. 246-265 |
artikel |
9 |
Asynchronous Background Processing for accelerated simulation of wireless communication on multi-core systems
|
Buse, Dominik S. |
|
|
193 |
C |
p. 396-409 |
artikel |
10 |
A Website Fingerprint defense technology with low delay and controllable bandwidth
|
Hong, Xueshu |
|
|
193 |
C |
p. 332-345 |
artikel |
11 |
BotStop : Packet-based efficient and explainable IoT botnet detection using machine learning
|
Alani, Mohammed M. |
|
|
193 |
C |
p. 53-62 |
artikel |
12 |
Cognitive quality of service predictions in multi-node wireless sensor networks
|
Ateeq, Muhammad |
|
|
193 |
C |
p. 155-167 |
artikel |
13 |
Context-based caching in mobile information-centric networks
|
Leira, Luís |
|
|
193 |
C |
p. 214-223 |
artikel |
14 |
Cooperative driving: A comprehensive perspective, the role of communications, and its potential development
|
Lo Cigno, Renato |
|
|
193 |
C |
p. 82-93 |
artikel |
15 |
Deployment of UAV-mounted Access Points for VoWiFi Service with guaranteed QoS
|
Mayor, Vicente |
|
|
193 |
C |
p. 94-108 |
artikel |
16 |
dMOBAs: A data marketplace on blockchain with arbitration using side-contracts mechanism
|
Tang, Hangyun |
|
|
193 |
C |
p. 10-22 |
artikel |
17 |
ECiS: Encryption prior to compression for digital image security with reduced memory
|
Singh, Kedar Nath |
|
|
193 |
C |
p. 410-417 |
artikel |
18 |
EC-MASS: Towards an efficient edge computing-based multi-video scheduling system
|
Yang, Shu |
|
|
193 |
C |
p. 355-364 |
artikel |
19 |
Editorial Board
|
|
|
|
193 |
C |
p. ii-iii |
artikel |
20 |
GA-based geometrically optimized topology robustness to improve ambient intelligence for future internet of things
|
Changazi, Sabir Ali |
|
|
193 |
C |
p. 109-117 |
artikel |
21 |
Geolocation-based sector selection for Vehicle-to-Infrastructure 802.11ad communication
|
Mattos, Mateus |
|
|
193 |
C |
p. 224-233 |
artikel |
22 |
Hierarchical pattern matching for anomaly detection in time series
|
Van Onsem, M. |
|
|
193 |
C |
p. 75-81 |
artikel |
23 |
Improving 5G network performance for OFDM-IDMA system resource management optimization using bio-inspired algorithm with RSM
|
Jadhav, Makarand |
|
|
193 |
C |
p. 23-37 |
artikel |
24 |
Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope
|
Sheikh, Zakir Ahmad |
|
|
193 |
C |
p. 302-331 |
artikel |
25 |
IoT enabled HELMET to safeguard the health of mine workers
|
Singh, Ninni |
|
|
193 |
C |
p. 1-9 |
artikel |
26 |
Neural language models for network configuration: Opportunities and reality check
|
Ben Houidi, Zied |
|
|
193 |
C |
p. 118-125 |
artikel |
27 |
Preventing failures of cooperative maneuvers among connected and automated vehicles
|
Häfner, Bernhard |
|
|
193 |
C |
p. 234-245 |
artikel |
28 |
Secrecy performance analysis of amplify-and-forward relay cooperative networks with simultaneous wireless information and power transfer
|
Parkouk, Sahar |
|
|
193 |
C |
p. 365-377 |
artikel |
29 |
Secure aggregate signature scheme for smart city applications
|
Eltayieb, Nabeil |
|
|
193 |
C |
p. 388-395 |
artikel |
30 |
Securing Internet of Things devices against code tampering attacks using Return Oriented Programming
|
Shrivastava, Rajesh Kumar |
|
|
193 |
C |
p. 38-46 |
artikel |
31 |
SLICES, a scientific instrument for the networking community
|
Fdida, Serge |
|
|
193 |
C |
p. 189-203 |
artikel |
32 |
Staggered HLL: Near-continuous-time cardinality estimation with no overhead
|
Cornacchia, Alessandro |
|
|
193 |
C |
p. 168-175 |
artikel |
33 |
Time-slotted LoRa MAC with variable payload support
|
Triantafyllou, Anna |
|
|
193 |
C |
p. 146-154 |
artikel |
34 |
Toward native explainable and robust AI in 6G networks: Current state, challenges and road ahead
|
Fiandrino, Claudio |
|
|
193 |
C |
p. 47-52 |
artikel |
35 |
TTSL: An indoor localization method based on Temporal Convolutional Network using time-series RSSI
|
Jia, Bing |
|
|
193 |
C |
p. 293-301 |
artikel |
36 |
Two-attribute privacy protection method of MCS based on blockchain smart contract
|
Wang, Jian |
|
|
193 |
C |
p. 126-135 |
artikel |
37 |
Using self-deferral to achieve fairness between Wi-Fi and NR-U in downlink and uplink scenarios
|
Szott, Szymon |
|
|
193 |
C |
p. 176-188 |
artikel |