nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive review on variants of SARS-CoVs-2: Challenges, solutions and open issues
|
Deepanshi, |
|
|
197 |
C |
p. 34-51 |
artikel |
2 |
A comprehensive survey on age of information in massive IoT networks
|
Abbas, Qamar |
|
|
197 |
C |
p. 199-213 |
artikel |
3 |
A hybrid caching strategy for information-centric satellite networks based on node classification and popular content awareness
|
Xu, Rui |
|
|
197 |
C |
p. 186-198 |
artikel |
4 |
A Location-Aware RF-Assisted MAC Protocol for Sectorized Vehicular Visible Light Communications
|
Memedi, Agon |
|
|
197 |
C |
p. 151-158 |
artikel |
5 |
An area autonomous routing protocol based on multi-objective optimization methods for field observation instrument network
|
Huo, Jiuyuan |
|
|
197 |
C |
p. 71-86 |
artikel |
6 |
An efficient computation offloading and resource allocation algorithm in RIS empowered MEC
|
Zhang, Xiangjun |
|
|
197 |
C |
p. 113-123 |
artikel |
7 |
An Energy-optimized Embedded load balancing using DVFS computing in Cloud Data centers
|
Javadpour, Amir |
|
|
197 |
C |
p. 255-266 |
artikel |
8 |
A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions
|
Chaganti, Rajasekhar |
|
|
197 |
C |
p. 96-112 |
artikel |
9 |
Cellular traffic prediction via deep state space models with attention mechanism
|
Ma, Hui |
|
|
197 |
C |
p. 276-283 |
artikel |
10 |
Classification And Regression Tree (CART) based resource allocation scheme for Wireless Sensor Networks
|
Kori, Gururaj S. |
|
|
197 |
C |
p. 242-254 |
artikel |
11 |
CO-CAC: A new approach to Call Admission Control for VoIP in 5G/WiFi UAV-based relay networks
|
Mayor, Vicente |
|
|
197 |
C |
p. 284-293 |
artikel |
12 |
CSI-based location-independent Human Activity Recognition with parallel convolutional networks
|
Zhang, Yong |
|
|
197 |
C |
p. 87-95 |
artikel |
13 |
Design of secured blockchain based decentralized authentication protocol for sensor networks with auditing and accountability
|
Dwivedi, Sanjeev Kumar |
|
|
197 |
C |
p. 124-140 |
artikel |
14 |
Editorial Board
|
|
|
|
197 |
C |
p. ii-iii |
artikel |
15 |
Energy-efficient resource allocation in NOMA-integrated V2X networks
|
Shan, Liqing |
|
|
197 |
C |
p. 23-33 |
artikel |
16 |
Experimental comparison of migration strategies for MEC-assisted 5G-V2X applications
|
Hathibelagal, Mohammed A. |
|
|
197 |
C |
p. 1-11 |
artikel |
17 |
Femtocell deployment for scalable video transmission in 5G networks
|
Abiri, Majid |
|
|
197 |
C |
p. 61-70 |
artikel |
18 |
Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment
|
Mitra, Ankush |
|
|
197 |
C |
p. 173-185 |
artikel |
19 |
LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication
|
Yang, Yuanyuan |
|
|
197 |
C |
p. 214-229 |
artikel |
20 |
Network load prediction and anomaly detection using ensemble learning in 5G cellular networks
|
Haider, Usman |
|
|
197 |
C |
p. 141-150 |
artikel |
21 |
On performance of multi-RIS assisted multi-user nonorthogonal multiple access system over Nakagami- m fading channels
|
Nguyen, Ba Cao |
|
|
197 |
C |
p. 294-305 |
artikel |
22 |
Performance evaluation of mobile RPL-based IoT networks under version number attack
|
Sharma, Girish |
|
|
197 |
C |
p. 12-22 |
artikel |
23 |
Privacy-preserving spam filtering using homomorphic and functional encryption
|
Nguyen, Tham |
|
|
197 |
C |
p. 230-241 |
artikel |
24 |
ReTREM: A responsibility based trust revision model for determining trustworthiness of fog nodes
|
Yadav, Ravi |
|
|
197 |
C |
p. 159-172 |
artikel |
25 |
Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network
|
Cheng, Yuan |
|
|
197 |
C |
p. 267-275 |
artikel |
26 |
Swin-T-NFC CRFs: An encoder–decoder neural model for high-precision UAV positioning via point cloud super resolution and image semantic segmentation
|
Wang, Suhong |
|
|
197 |
C |
p. 52-60 |
artikel |