nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive latency profiling study of the Tofino P4 programmable ASIC-based hardware
|
Franco, David |
|
|
218 |
C |
p. 14-30 |
artikel |
2 |
A distinguished-bit tracking knowledge-based query tree for RFID tag identification
|
Lin, Chih-Chung |
|
|
218 |
C |
p. 166-175 |
artikel |
3 |
AlLoRa: Empowering environmental intelligence through an advanced LoRa-based IoT solution
|
Arratia, Benjamín |
|
|
218 |
C |
p. 44-58 |
artikel |
4 |
An attack-resistant target localization in underwater based on consensus fusion
|
Gao, Chenlu |
|
|
218 |
C |
p. 131-147 |
artikel |
5 |
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure
|
Rabhi, Mouna |
|
|
218 |
C |
p. 1-13 |
artikel |
6 |
An optimization NPUSCH uplink scheduling approach for NB-IoT application via the feasible combinations of link adaptation, Resource assignment and energy efficiency
|
Widodo, Agung Mulyo |
|
|
218 |
C |
p. 276-293 |
artikel |
7 |
A physical layer security scheme for 6G wireless networks using post-quantum cryptography
|
Abdallah, Walid |
|
|
218 |
C |
p. 176-187 |
artikel |
8 |
A secure certificateless ring signcryption scheme based on SM2 algorithm in smart grid
|
Liu, Shuanggen |
|
|
218 |
C |
p. 188-197 |
artikel |
9 |
Blockchain-based remote operation and maintenance network slicing resource transaction method for intelligent manufacturing products
|
Chen, Jin |
|
|
218 |
C |
p. 59-71 |
artikel |
10 |
Coverage performance of cooperative NOMA MmWave networks with wireless power transfer
|
Tang, Kun |
|
|
218 |
C |
p. 85-96 |
artikel |
11 |
Cyber–physical system architecture of autonomous robot ecosystem for industrial asset monitoring
|
Kivrak, Hasan |
|
|
218 |
C |
p. 72-84 |
artikel |
12 |
EAPRAD: A MAC protocol for Enhancing Access Probability and Reducing Access Delay in VANETs
|
Wu, Xiaolin |
|
|
218 |
C |
p. 148-156 |
artikel |
13 |
Editorial Board
|
|
|
|
218 |
C |
p. ii-iii |
artikel |
14 |
Evaluation of Greedy and CBF for ETSI non-area GeoNetworking: The impact of DCC
|
Amador, Oscar |
|
|
218 |
C |
p. 114-130 |
artikel |
15 |
GEMLIDS-MIOT: A Green Effective Machine Learning Intrusion Detection System based on Federated Learning for Medical IoT network security hardening
|
Ioannou, Iacovos |
|
|
218 |
C |
p. 209-239 |
artikel |
16 |
Online Learning to parallel offloading in heterogeneous wireless networks
|
Qin, Yulin |
|
|
218 |
C |
p. 253-262 |
artikel |
17 |
Privacy-preserving and verifiable data aggregation for Internet of Vehicles
|
Zhou, Fucai |
|
|
218 |
C |
p. 198-208 |
artikel |
18 |
Provably secured and lightweight authenticated encryption protocol in machine-to-machine communication in industry 4.0
|
Ashrif, Fatma Foad |
|
|
218 |
C |
p. 263-275 |
artikel |
19 |
PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication
|
Chen, Liquan |
|
|
218 |
C |
p. 31-43 |
artikel |
20 |
Radio-in-the-Loop simulation and emulation modeling for energy-efficient and cognitive Internet of Things in smart cities: A cross-layer optimization case study
|
Böhm, Sebastian |
|
|
218 |
C |
p. 157-165 |
artikel |
21 |
TDS-NA: Blockchain-based trusted data sharing scheme with PKI authentication
|
Ou, Zhenshen |
|
|
218 |
C |
p. 240-252 |
artikel |
22 |
Untargeted white-box adversarial attack with heuristic defence methods in real-time deep learning based network intrusion detection system
|
Roshan, Khushnaseeb |
|
|
218 |
C |
p. 97-113 |
artikel |