nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A max plus algebra based scheduling algorithm for supporting time triggered services in ethernet networks
|
Eramo, Vincenzo |
|
|
198 |
C |
p. 85-97 |
artikel |
2 |
An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things
|
Jahromi, Amir Namavar |
|
|
198 |
C |
p. 108-116 |
artikel |
3 |
A pairing-free data authentication and aggregation mechanism for Intelligent Healthcare System
|
Verma, Pooja |
|
|
198 |
C |
p. 282-296 |
artikel |
4 |
A review of Machine Learning-based zero-day attack detection: Challenges and future directions
|
Guo, Yang |
|
|
198 |
C |
p. 175-185 |
artikel |
5 |
A spectral clustering algorithm for intelligent grouping in Dense Wireless Networks
|
Guedes, Bruna Toledo |
|
|
198 |
C |
p. 117-127 |
artikel |
6 |
Blockchain-based distributed operation and incentive solution for P-RAN
|
Liu, Xiaoou |
|
|
198 |
C |
p. 77-84 |
artikel |
7 |
Collaborative computation offloading and resource allocation based on dynamic pricing in mobile edge computing
|
Xue, Jianbin |
|
|
198 |
C |
p. 52-62 |
artikel |
8 |
Comparative analysis of new meta-heuristic-variants for privacy preservation in wireless mobile adhoc networks for IoT applications
|
Satyanarayana, P. |
|
|
198 |
C |
p. 262-281 |
artikel |
9 |
Detection of DDoS attacks in D2D communications using machine learning approach
|
Rani, S.V. Jansi |
|
|
198 |
C |
p. 32-51 |
artikel |
10 |
Editorial Board
|
|
|
|
198 |
C |
p. ii-iii |
artikel |
11 |
Enabling Ambient Intelligence of Things (AIoT) healthcare system architectures
|
Pise, Anil |
|
|
198 |
C |
p. 186-194 |
artikel |
12 |
Evaluation of LoRaWAN class B performances and its optimization for better support of actuators
|
Elbsir, Houssem Eddin |
|
|
198 |
C |
p. 128-139 |
artikel |
13 |
Host load prediction in cloud computing with Discrete Wavelet Transformation (DWT) and Bidirectional Gated Recurrent Unit (BiGRU) network
|
Dogani, Javad |
|
|
198 |
C |
p. 157-174 |
artikel |
14 |
In-network aggregation for data center networks: A survey
|
Feng, Aoxiang |
|
|
198 |
C |
p. 63-76 |
artikel |
15 |
Integrating interactions between target users and opinion leaders for better recommendations: An opinion dynamics approach
|
Weng, Lijuan |
|
|
198 |
C |
p. 98-107 |
artikel |
16 |
Network traffic anomaly detection method based on multi-scale residual classifier
|
Duan, Xueyuan |
|
|
198 |
C |
p. 206-216 |
artikel |
17 |
Performance evaluation methodologies for Smart Grid Substation Communication Networks: A survey
|
Docquier, Théo |
|
|
198 |
C |
p. 228-246 |
artikel |
18 |
Road crash risk prediction during COVID-19 for flash crowd traffic prevention: The case of Los Angeles
|
Wang, Junbo |
|
|
198 |
C |
p. 195-205 |
artikel |
19 |
Self-organizing maps and full GPU parallel approach to graph matching
|
Cui, Beibei |
|
|
198 |
C |
p. 217-227 |
artikel |
20 |
Towards SDN-based smart contract solution for IoT access control
|
Khalid, Mizna |
|
|
198 |
C |
p. 1-31 |
artikel |
21 |
Viral marketing branching processes
|
Dhounchak, Ranbir |
|
|
198 |
C |
p. 140-156 |
artikel |
22 |
VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain
|
Kara, Mustafa |
|
|
198 |
C |
p. 247-261 |
artikel |