nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Activate or sleep? An optimal two-threshold policy for transmission service
|
Fan, Jiaqi |
|
|
217 |
C |
p. 152-165 |
artikel |
2 |
A robust and machine learning-driven identification scheme for malicious nodes in UASNs
|
Huang, Xiangdang |
|
|
217 |
C |
p. 1-11 |
artikel |
3 |
ASSOCIATE: A simulator for assessing soft security in the Cognitive Internet of Things
|
Narimani Zaman Abadi, Masoud |
|
|
217 |
C |
p. 107-125 |
artikel |
4 |
A truthful double auction framework for security-driven and deadline-aware task offloading in fog-cloud environment
|
Mikavica, Branka |
|
|
217 |
C |
p. 183-199 |
artikel |
5 |
Available energy routing algorithm considering QoS requirements for LEO satellite network
|
Yang, Li |
|
|
217 |
C |
p. 87-96 |
artikel |
6 |
Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture
|
Xie, Hui |
|
|
217 |
C |
p. 259-267 |
artikel |
7 |
Editorial Board
|
|
|
|
217 |
C |
p. ii-iii |
artikel |
8 |
Exploring the design space of privacy-enhanced content discovery for bitswap
|
Daniel, Erik |
|
|
217 |
C |
p. 12-24 |
artikel |
9 |
Feature selection applied to QoS/QoE modeling on video and web-based mobile data services: An ordinal approach
|
GarcĂa-Torres, Miguel |
|
|
217 |
C |
p. 230-245 |
artikel |
10 |
LAMP: A latency-aware MAC protocol for joint scheduling of CAM and DENM traffic over 5G-NR sidelink
|
Daw, Suranjan |
|
|
217 |
C |
p. 41-56 |
artikel |
11 |
Mobility aware and energy-efficient federated deep reinforcement learning assisted resource allocation for 5G-RAN slicing
|
Azimi, Yaser |
|
|
217 |
C |
p. 166-182 |
artikel |
12 |
ms-van3t: An integrated multi-stack framework for virtual validation of V2X communication and services
|
Raviglione, F. |
|
|
217 |
C |
p. 70-86 |
artikel |
13 |
Optimizing Secrecy Energy Efficiency in RIS-assisted MISO systems using Deep Reinforcement Learning
|
Razaq, Mian Muaz |
|
|
217 |
C |
p. 126-133 |
artikel |
14 |
Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMOR
|
Krentz, Konrad-Felix |
|
|
217 |
C |
p. 57-69 |
artikel |
15 |
Semantic segmentation of deep learning remote sensing images based on band combination principle: Application in urban planning and land use
|
Jia, Peiyan |
|
|
217 |
C |
p. 97-106 |
artikel |
16 |
The anatomy of conspiracy theorists: Unveiling traits using a comprehensive Twitter dataset
|
Gambini, Margherita |
|
|
217 |
C |
p. 25-40 |
artikel |
17 |
Throughput maximization in multi-slice cooperative NOMA-based system with underlay D2D communications
|
Amer, Asmaa |
|
|
217 |
C |
p. 134-151 |
artikel |
18 |
Traffic matrix estimation using matrix-CUR decomposition
|
Kumar, Awnish |
|
|
217 |
C |
p. 200-207 |
artikel |
19 |
VeriBypasser: An automatic image verification code recognition system based on CNN
|
Ding, Weihang |
|
|
217 |
C |
p. 246-258 |
artikel |
20 |
When game theory meets satellite communication networks: A survey
|
Jiang, Weiwei |
|
|
217 |
C |
p. 208-229 |
artikel |