nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
AGCM: A multi-stage attack correlation and scenario reconstruction method based on graph aggregation
|
Lyu, Hongshuo |
|
|
224 |
C |
p. 302-313 |
artikel |
2 |
An adaptive simulated annealing-based computational offloading scheme in UAV-assisted MEC networks
|
Hsu, Ching-Kuo |
|
|
224 |
C |
p. 118-124 |
artikel |
3 |
An interference-conscious reduced routing overhead protocol for Device-to-Device (D2D) Networks
|
Shaikh, Farrukh Salim |
|
|
224 |
C |
p. 169-191 |
artikel |
4 |
BBR-based and fairness-guaranteed congestion control and packet scheduling for MPQUIC over heterogeneous networks
|
Deng, Zhenjie |
|
|
224 |
C |
p. 213-224 |
artikel |
5 |
CATFSID: A few-shot human identification system based on cross-domain adversarial training
|
Wei, Zhongcheng |
|
|
224 |
C |
p. 275-284 |
artikel |
6 |
COSIER: A comprehensive lightweight blockchain system for IoT networks
|
Mershad, Khaleel |
|
|
224 |
C |
p. 125-144 |
artikel |
7 |
DA2Wa: A secure pairing protocol between a DApp and a wallet for the blockchain scenario
|
Román-García, Fernando |
|
|
224 |
C |
p. 1-15 |
artikel |
8 |
Dynamic task offloading and service caching based on game theory in vehicular edge computing networks
|
Cheng, Chen |
|
|
224 |
C |
p. 29-41 |
artikel |
9 |
Editorial Board
|
|
|
|
224 |
C |
p. ii-iii |
artikel |
10 |
Identity management for Internet of Things: Concepts, challenges and opportunities
|
Cremonezi, Bruno |
|
|
224 |
C |
p. 72-94 |
artikel |
11 |
IoT video analytics for surveillance-based systems in smart cities
|
Aminiyeganeh, Kasra |
|
|
224 |
C |
p. 95-105 |
artikel |
12 |
Multi-objective optimization of SFC deployment using service aggregation and computing offload
|
Xiao, Junbi |
|
|
224 |
C |
p. 60-71 |
artikel |
13 |
Optimal smart contracts for controlling the environment in electric vehicles based on an Internet of Things network
|
Hijjawi, Mohammad |
|
|
224 |
C |
p. 192-212 |
artikel |
14 |
Optimized provisioning technique of future services with different QoS requirements in multi-access edge computing
|
Ssemakula, John Bosco |
|
|
224 |
C |
p. 42-59 |
artikel |
15 |
Progressive supervised pedestrian detection algorithm for green edge–cloud computing
|
She, Liang |
|
|
224 |
C |
p. 16-28 |
artikel |
16 |
Secure data sharing scheme with privacy-preserving and certificateless integrity auditing in cloud storage
|
Guan, Xuening |
|
|
224 |
C |
p. 285-301 |
artikel |
17 |
Secure multi-party computation with secret sharing for real-time data aggregation in IIoT
|
Liu, Dengzhi |
|
|
224 |
C |
p. 159-168 |
artikel |
18 |
Supporting VoIP communication in IEEE 802.11ax networks: A new admission control and scheduling resource allocation scheme
|
Estepa, Rafael |
|
|
224 |
C |
p. 225-241 |
artikel |
19 |
Towards a quantum-safe 5G: Quantum Key Distribution in core networks
|
Atutxa, Asier |
|
|
224 |
C |
p. 145-158 |
artikel |
20 |
UMPL- VINS: Generalized SLAM for multi-scene metaverse applications
|
Jiang, Hao |
|
|
224 |
C |
p. 242-253 |
artikel |
21 |
VSFL: Trajectory prediction framework based on validity-aware semi-asynchronous federated learning in internet of vehicles
|
Li, Yang |
|
|
224 |
C |
p. 106-117 |
artikel |
22 |
Wireless sensing applications with Wi-Fi Channel State Information, preprocessing techniques, and detection algorithms: A survey
|
Armenta-Garcia, Jesus A. |
|
|
224 |
C |
p. 254-274 |
artikel |