nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
AD 2 S: Adaptive anomaly detection on sporadic data streams
|
Liu, Fengrui |
|
|
209 |
C |
p. 151-162 |
artikel |
2 |
A dynamic conjunctive keywords searchable symmetric encryption scheme for multiple users in cloud computing
|
Lv, Sichun |
|
|
209 |
C |
p. 239-248 |
artikel |
3 |
A joint cluster-based RRM and Low-latency framework using the full-duplex mechanism for NR-V2X networks
|
Waqas, Syed Muhammad |
|
|
209 |
C |
p. 513-525 |
artikel |
4 |
An adaptive context-aware vertical handover decision algorithm for heterogeneous networks
|
Satapathy, Pratyashi |
|
|
209 |
C |
p. 188-202 |
artikel |
5 |
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
|
Khan, Tayyab |
|
|
209 |
C |
p. 217-229 |
artikel |
6 |
An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC
|
Chatterjee, Uddalak |
|
|
209 |
C |
p. 47-62 |
artikel |
7 |
A novel approach for ray tracing optimization in wireless communication
|
Sandouno, Bernard Tamba |
|
|
209 |
C |
p. 309-319 |
artikel |
8 |
A novel hybrid method for achieving accurate and timeliness vehicular traffic flow prediction in road networks
|
Wang, Zepu |
|
|
209 |
C |
p. 378-386 |
artikel |
9 |
A secure physical health test data sharing scheme based on token distribution and programmable blockchains
|
Wang, Xiangjie |
|
|
209 |
C |
p. 444-454 |
artikel |
10 |
A study on 5G performance and fast conditional handover for public transit systems
|
Fiandrino, Claudio |
|
|
209 |
C |
p. 499-512 |
artikel |
11 |
Autonomous confrontation strategy learning evolution mechanism of unmanned system group under actual combat in the loop
|
Wang, Zhenhua |
|
|
209 |
C |
p. 283-301 |
artikel |
12 |
Auto-scaling techniques in container-based cloud and edge/fog computing: Taxonomy and survey
|
Dogani, Javad |
|
|
209 |
C |
p. 120-150 |
artikel |
13 |
Average age upon decisions with truncated HARQ and optimization in the finite blocklength regime
|
Bao, Zhiwei |
|
|
209 |
C |
p. 387-401 |
artikel |
14 |
Blind-trust: Raising awareness of the dangers of using unsecured public Wi-Fi networks
|
Sangeen, Muhammad |
|
|
209 |
C |
p. 359-367 |
artikel |
15 |
Blockchain based resource allocation in cloud and distributed edge computing: A survey
|
Baranwal, Gaurav |
|
|
209 |
C |
p. 469-498 |
artikel |
16 |
Blockchain based secure medical data outsourcing with data deduplication in cloud environment
|
Benil, T. |
|
|
209 |
C |
p. 1-13 |
artikel |
17 |
BSAPM: BlockChain based secured authentication protocol for large scale WSN with FPGA implementation
|
Abdussami, Mohammad |
|
|
209 |
C |
p. 63-77 |
artikel |
18 |
Collaborative cloud-edge-end task offloading with task dependency based on deep reinforcement learning
|
Tang, Tiantian |
|
|
209 |
C |
p. 78-90 |
artikel |
19 |
Constructions of broadcast encryption with personalized messages from bilinear map
|
Acharya, Kamalesh |
|
|
209 |
C |
p. 91-101 |
artikel |
20 |
Cost-efficient slicing in virtual Radio Access Networks
|
Pramanik, Somreeta |
|
|
209 |
C |
p. 349-358 |
artikel |
21 |
COUNT: Blockchain framework for resource accountability in e-healthcare
|
Kumar, Gulshan |
|
|
209 |
C |
p. 249-259 |
artikel |
22 |
Editorial Board
|
|
|
|
209 |
C |
p. ii-iii |
artikel |
23 |
Empirical evaluation of 5G and Wi-Fi mesh interworking for Integrated Access and Backhaul networking paradigm
|
Khadmaoui-Bichouna, Mohamed |
|
|
209 |
C |
p. 429-443 |
artikel |
24 |
Enhanced resource allocation in distributed cloud using fuzzy meta-heuristics optimization
|
Sangaiah, Arun Kumar |
|
|
209 |
C |
p. 14-25 |
artikel |
25 |
FAMG: A flow-aware and mixed granularity method for load-balancing in data center networks
|
Lu, Yifei |
|
|
209 |
C |
p. 415-428 |
artikel |
26 |
Focusing on information context for ITS using a spatial age of information model
|
Heinovski, Julian |
|
|
209 |
C |
p. 203-216 |
artikel |
27 |
Graphic image classification method based on an attention mechanism and fusion of multilevel and multiscale deep features
|
Liu, Shan |
|
|
209 |
C |
p. 230-238 |
artikel |
28 |
How to improve the rumor-confutation ability of official rumor-refuting account on social media: A Chinese case study
|
Tu, Yan |
|
|
209 |
C |
p. 331-348 |
artikel |
29 |
Improved TDD operation on Software-Defined Radio platforms towards future wireless standards
|
Havinga, Thijs |
|
|
209 |
C |
p. 178-187 |
artikel |
30 |
IoT-based generalized multi-granulation sequential three-way decisions
|
Zhang, Yongjing |
|
|
209 |
C |
p. 402-414 |
artikel |
31 |
Joint task offloading and resource allocation in mixed edge/cloud computing and blockchain empowered device-free sensing systems
|
Du, Jianbo |
|
|
209 |
C |
p. 38-46 |
artikel |
32 |
NOMA-based energy efficient resource allocation in wireless energy harvesting sensor networks
|
Azarhava, Hosein |
|
|
209 |
C |
p. 302-308 |
artikel |
33 |
Novel EBBDSA based Resource Allocation Technique for Interference Mitigation in 5G Heterogeneous Network
|
Hasan, Mohammad Kamrul |
|
|
209 |
C |
p. 320-330 |
artikel |
34 |
OWL: A data sharing scheme with controllable anonymity and integrity for group users
|
Zhang, Yongxin |
|
|
209 |
C |
p. 455-468 |
artikel |
35 |
Partial offloading in device-to-device-assisted MEC network: A utility optimization approach
|
Zhang, Ruidong |
|
|
209 |
C |
p. 26-37 |
artikel |
36 |
Performance analysis of general P4 forwarding devices with controller feedback: Single- and multi-data plane cases
|
Kröger, Nicolai |
|
|
209 |
C |
p. 102-119 |
artikel |
37 |
PROSE: Multi-round fair coflow scheduling without prior knowledge
|
Zhang, Fan |
|
|
209 |
C |
p. 163-177 |
artikel |
38 |
Real-Time-Shift: Pseudo-Real-Time Event Scheduling for the Split-Protocol-Stack Radio-in-the-Loop Emulation
|
Böhm, Sebastian |
|
|
209 |
C |
p. 273-282 |
artikel |
39 |
Throughput maximization for downlink DF MIMO relay based SWIPT cognitive radio networks
|
Mohammadi, Mahla |
|
|
209 |
C |
p. 368-377 |
artikel |
40 |
Trustworthy artificial intelligence classification-based equivalent bandwidth control
|
Narteni, Sara |
|
|
209 |
C |
p. 260-272 |
artikel |