nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A baseline for unsupervised advanced persistent threat detection in system-level provenance
|
Berrada, Ghita |
|
|
108 |
C |
p. 401-413 |
artikel |
2 |
A benchmark set of highly-efficient CUDA and OpenCL kernels and its dynamic autotuning with Kernel Tuning Toolkit
|
Petrovič, Filip |
|
|
108 |
C |
p. 161-177 |
artikel |
3 |
Accelerating smart eHealth services execution at the fog computing infrastructure
|
García-Valls, Marisol |
|
|
108 |
C |
p. 882-893 |
artikel |
4 |
Access pattern-based high-performance main memory system for graph processing on single machines
|
Yun, Ji-Tae |
|
|
108 |
C |
p. 560-573 |
artikel |
5 |
Achieving high utilization of flowlet-based load balancing in data center networks
|
Zou, Shaojun |
|
|
108 |
C |
p. 546-559 |
artikel |
6 |
Adaptive Backoff enabled WUR on non-cellular local IoT for extreme low power operation
|
Park, Hyunhee |
|
|
108 |
C |
p. 62-67 |
artikel |
7 |
A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain
|
Wang, Eric Ke |
|
|
108 |
C |
p. 135-144 |
artikel |
8 |
A distributed business process fragmentation method based on community discovery
|
Wu, Budan |
|
|
108 |
C |
p. 372-389 |
artikel |
9 |
Affective database for e-learning and classroom environments using Indian students’ faces, hand gestures and body postures
|
T.S., Ashwin |
|
|
108 |
C |
p. 334-348 |
artikel |
10 |
Agent-based middleware framework using distributed CPS for improving resource utilization in smart city
|
Chang, Kuo-Chi |
|
|
108 |
C |
p. 445-453 |
artikel |
11 |
A location-based orientation-aware recommender system using IoT smart devices and Social Networks
|
Ojagh, Soroush |
|
|
108 |
C |
p. 97-118 |
artikel |
12 |
A meritocratic trust-based group formation in an IoT environment for smart cities
|
Fortino, G. |
|
|
108 |
C |
p. 34-45 |
artikel |
13 |
Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks
|
Chadza, Timothy |
|
|
108 |
C |
p. 636-649 |
artikel |
14 |
An efficient deep learning-based scheme for web spam detection in IoT environment
|
Makkar, Aaisha |
|
|
108 |
C |
p. 467-487 |
artikel |
15 |
An energy-aware algorithm for electric vehicle infrastructures in smart cities
|
Palanca, Javier |
|
|
108 |
C |
p. 454-466 |
artikel |
16 |
A new scalable authentication and access control mechanism for 5G-based IoT
|
Behrad, Shanay |
|
|
108 |
C |
p. 46-61 |
artikel |
17 |
A note on advances in scheduling algorithms for Cyber-Physical-Social workflows
|
Ranjan, Rajiv |
|
|
108 |
C |
p. 1027-1029 |
artikel |
18 |
A novel multitype-users welfare equilibrium based real-time pricing in smart grid
|
Lin, Jie |
|
|
108 |
C |
p. 145-160 |
artikel |
19 |
A prioritization approach for optimization of multiple concurrent sensing applications in smart cities
|
Costa, Daniel G. |
|
|
108 |
C |
p. 228-243 |
artikel |
20 |
A spatiotemporal data compression approach with low transmission cost and high data fidelity for an air quality monitoring system
|
Chen, Hsing-Chung |
|
|
108 |
C |
p. 488-500 |
artikel |
21 |
A Stackelberg game approach to multiple resources allocation and pricing in mobile edge computing
|
Chen, Yifan |
|
|
108 |
C |
p. 273-287 |
artikel |
22 |
A two-stage multi-operator differential evolution algorithm for solving Resource Constrained Project Scheduling problems
|
Sallam, Karam M. |
|
|
108 |
C |
p. 432-444 |
artikel |
23 |
A unified framework for big data acquisition, storage, and analytics for demand response management in smart cities
|
Jindal, Anish |
|
|
108 |
C |
p. 921-934 |
artikel |
24 |
Authentication and integrity of smartphone videos through multimedia container structure analysis
|
Quinto Huamán, Carlos |
|
|
108 |
C |
p. 15-33 |
artikel |
25 |
A variant form of 3D-UNet for infant brain segmentation
|
Qamar, Saqib |
|
|
108 |
C |
p. 613-623 |
artikel |
26 |
BES: Differentially private event aggregation for large-scale IoT-based systems
|
Tudor, Valentin |
|
|
108 |
C |
p. 1241-1257 |
artikel |
27 |
Bigraph specification of software architecture and evolution analysis in mobile computing environment
|
Lu, Chao-ze |
|
|
108 |
C |
p. 662-676 |
artikel |
28 |
Cascaded Volumetric Fully Convolutional Networks for Whole-Heart and Great Vessel 3D segmentation
|
Han, Tao |
|
|
108 |
C |
p. 198-209 |
artikel |
29 |
Class expression induction as concept space exploration: From DL-Foil to DL-Focl
|
Rizzo, Giuseppe |
|
|
108 |
C |
p. 256-272 |
artikel |
30 |
clMF: A fine-grained and portable alternating least squares algorithm for parallel matrix factorization
|
Chen, Jing |
|
|
108 |
C |
p. 1192-1205 |
artikel |
31 |
Cultural distance for service composition in cyber–physical–social systems
|
Wang, Shangguang |
|
|
108 |
C |
p. 1049-1057 |
artikel |
32 |
Decentralized learning for self-adaptive QoS-aware service assembly
|
D’Angelo, Mirko |
|
|
108 |
C |
p. 210-227 |
artikel |
33 |
Deep interaction: Wearable robot-assisted emotion communication for enhancing perception and expression ability of children with Autism Spectrum Disorders
|
Xiao, Wenjing |
|
|
108 |
C |
p. 709-716 |
artikel |
34 |
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems
|
Challa, Sravani |
|
|
108 |
C |
p. 1267-1286 |
artikel |
35 |
Detecting insider attacks in medical cyber–physical networks based on behavioral profiling
|
Meng, Weizhi |
|
|
108 |
C |
p. 1258-1266 |
artikel |
36 |
Detecting stealthy attacks on industrial control systems using a permutation entropy-based method
|
Hu, Yan |
|
|
108 |
C |
p. 1230-1240 |
artikel |
37 |
Differentially private model publishing in cyber physical systems
|
Zhu, Tianqing |
|
|
108 |
C |
p. 1297-1306 |
artikel |
38 |
Dimensionality reduction via preserving local information
|
Wang, Shangguang |
|
|
108 |
C |
p. 967-975 |
artikel |
39 |
Driverless vehicle security: Challenges and future research opportunities
|
De La Torre, Gonzalo |
|
|
108 |
C |
p. 1092-1111 |
artikel |
40 |
Dynamic network embedding enhanced advisor–advisee relationship identification based on internet of scholars
|
Gao, Ying |
|
|
108 |
C |
p. 677-686 |
artikel |
41 |
Dynamic virtual machine consolidation using a multi-agent system to optimise energy efficiency in cloud computing
|
Mc Donnell, Nicola |
|
|
108 |
C |
p. 288-301 |
artikel |
42 |
DYVERSE: DYnamic VERtical Scaling in multi-tenant Edge environments
|
Wang, Nan |
|
|
108 |
C |
p. 598-612 |
artikel |
43 |
Editorial Board
|
|
|
|
108 |
C |
p. ii |
artikel |
44 |
Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication
|
Parah, Shabir A. |
|
|
108 |
C |
p. 935-949 |
artikel |
45 |
Evaluating IoT service composition mechanisms for the scalability of IoT systems
|
Arellanes, Damian |
|
|
108 |
C |
p. 827-848 |
artikel |
46 |
Evolutionary game for task mapping in resource constrained heterogeneous environments
|
Madeo, Dario |
|
|
108 |
C |
p. 762-776 |
artikel |
47 |
FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices
|
Zhang, Yiting |
|
|
108 |
C |
p. 1324-1337 |
artikel |
48 |
Flexible mesh morphing in sustainable design using data mining and mesh subdivision
|
Gao, Yicong |
|
|
108 |
C |
p. 987-994 |
artikel |
49 |
Formal specification and verification of reusable communication models for distributed systems architecture
|
Rouland, Quentin |
|
|
108 |
C |
p. 178-197 |
artikel |
50 |
GPS-aided inter-microcell interference avoidance for request-transmission splitting slotted ALOHA-based scheme in smart cities with connected vehicles
|
Peng, Shenglong |
|
|
108 |
C |
p. 501-511 |
artikel |
51 |
HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations
|
Liu, Xinyao |
|
|
108 |
C |
p. 390-400 |
artikel |
52 |
Improving communication precision of IoT through behavior-based learning in smart city environment
|
Li, Daming |
|
|
108 |
C |
p. 512-520 |
artikel |
53 |
Incomplete data classification—Fisher Discriminant Ratios versus Welch Discriminant Ratios
|
Chen, Bo-Wei |
|
|
108 |
C |
p. 894-908 |
artikel |
54 |
Internet of energy-based demand response management scheme for smart homes and PHEVs using SVM
|
Jindal, Anish |
|
|
108 |
C |
p. 1058-1068 |
artikel |
55 |
Joint optimization of function mapping and preemptive scheduling for service chains in network function virtualization
|
Yao, Hong |
|
|
108 |
C |
p. 1112-1118 |
artikel |
56 |
Kinesiology-inspired estimation of pedestrian walk direction for smart surveillance
|
Raman, Rahul |
|
|
108 |
C |
p. 1008-1026 |
artikel |
57 |
Knowledge transfer by domain-independent user latent factor for cross-domain recommender systems
|
Sahu, Ashish Kumar |
|
|
108 |
C |
p. 320-333 |
artikel |
58 |
LDC: A lightweight dada consensus algorithm based on the blockchain for the industrial Internet of Things for smart city applications
|
Zhang, Wenbo |
|
|
108 |
C |
p. 574-582 |
artikel |
59 |
Live forensics of software attacks on cyber–physical systems
|
Al-Sharif, Ziad A. |
|
|
108 |
C |
p. 1217-1229 |
artikel |
60 |
Logarithmic encryption scheme for cyber–physical systems employing Fibonacci Q-matrix
|
Zhou, Tianqi |
|
|
108 |
C |
p. 1307-1313 |
artikel |
61 |
Minimizing executing and transmitting time of task scheduling and resource allocation in C-RANs
|
Hu, Chia-Cheng |
|
|
108 |
C |
p. 349-360 |
artikel |
62 |
Mirror saturation in amplified reflection Distributed Denial of Service: A case of study using SNMP, SSDP, NTP and DNS protocols
|
Gondim, João J.C. |
|
|
108 |
C |
p. 68-81 |
artikel |
63 |
MMSparse: 2D partitioning of sparse matrix based on mathematical morphology
|
Tan, Zhaonian |
|
|
108 |
C |
p. 521-532 |
artikel |
64 |
Model checking of robustness properties in trust and reputation systems
|
Ghasempouri, Seyed Asgary |
|
|
108 |
C |
p. 302-319 |
artikel |
65 |
Modeling and Proving Distributed Algorithms for Dynamic Graphs
|
Fakhfakh, Faten |
|
|
108 |
C |
p. 751-761 |
artikel |
66 |
Modelling and optimisation of microgrid configuration for green data centres: A metaheuristic approach
|
Rahmani, R. |
|
|
108 |
C |
p. 742-750 |
artikel |
67 |
Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems
|
Shen, Jian |
|
|
108 |
C |
p. 1129-1139 |
artikel |
68 |
MSSN-Onto: An ontology-based approach for flexible event processing in Multimedia Sensor Networks
|
Angsuchotmetee, Chinnapong |
|
|
108 |
C |
p. 1140-1158 |
artikel |
69 |
Multidimensional auction for task allocation using computation offloading in fifth generation networks
|
Ali, Eslam B. |
|
|
108 |
C |
p. 717-725 |
artikel |
70 |
Multi-modal Bayesian embedding for point-of-interest recommendation on location-based cyber-physical–social networks
|
Huang, Liwei |
|
|
108 |
C |
p. 1119-1128 |
artikel |
71 |
Next-generation big data federation access control: A reference model
|
Awaysheh, Feras M. |
|
|
108 |
C |
p. 726-741 |
artikel |
72 |
Optimal job partitioning and allocation for vehicular cloud computing
|
Kim, Taesik |
|
|
108 |
C |
p. 82-96 |
artikel |
73 |
Optimization of real-time traffic network assignment based on IoT data using DBN and clustering model in smart city
|
Yang, Jiachen |
|
|
108 |
C |
p. 976-986 |
artikel |
74 |
Parallel and Distributed Machine Learning Algorithms for Scalable Big Data Analytics
|
Bal, Henri |
|
|
108 |
C |
p. 1159-1161 |
artikel |
75 |
Parallelizing and optimizing neural Encoder–Decoder models without padding on multi-core architecture
|
Qiao, Yuchen |
|
|
108 |
C |
p. 1206-1213 |
artikel |
76 |
Perception-enhancement based task learning and action scheduling for robotic limb in CPS environment
|
Li, Shijian |
|
|
108 |
C |
p. 1069-1083 |
artikel |
77 |
Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber–physical system
|
Xu, Jian |
|
|
108 |
C |
p. 1287-1296 |
artikel |
78 |
QAOC: Novel query analysis and ontology-based clustering for data management in Hadoop
|
Pradeep, D. |
|
|
108 |
C |
p. 849-860 |
artikel |
79 |
Q-learning based dynamic task scheduling for energy-efficient cloud computing
|
Ding, Ding |
|
|
108 |
C |
p. 361-371 |
artikel |
80 |
Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities
|
Sajjad, Muhammad |
|
|
108 |
C |
p. 995-1007 |
artikel |
81 |
Real time dataset generation framework for intrusion detection systems in IoT
|
Al-Hadhrami, Yahya |
|
|
108 |
C |
p. 414-423 |
artikel |
82 |
REBATE: A REpulsive-BAsed Traffic Engineering protocol for dynamic scale-free networks
|
Chemodanov, Dmitrii |
|
|
108 |
C |
p. 624-635 |
artikel |
83 |
Reservoir-based sampling over large graph streams to estimate triangle counts and node degrees
|
Zhang, Lingling |
|
|
108 |
C |
p. 244-255 |
artikel |
84 |
RETRACTED: Erratum to “Smart health monitoring and management system: Toward autonomous wearable sensing for Internet of Things using big data analytics [Future Gener. Comput. Syst. 91 (2019) 611–619]”
|
Din, Sadia |
|
|
108 |
C |
p. 1350-1359 |
artikel |
85 |
Revenue-maximizing virtualized network function chain placement in dynamic environment
|
Xie, Yanghao |
|
|
108 |
C |
p. 650-661 |
artikel |
86 |
Rule-based machine learning for knowledge discovering in weather data
|
Coulibaly, Lassana |
|
|
108 |
C |
p. 861-878 |
artikel |
87 |
Scaling Deep Learning workloads: NVIDIA DGX-1/Pascal and Intel Knights Landing
|
Gawande, Nitin A. |
|
|
108 |
C |
p. 1162-1172 |
artikel |
88 |
SCERM—A novel framework for automated management of cyber threat response activities
|
Iqbal, Zafar |
|
|
108 |
C |
p. 687-708 |
artikel |
89 |
Scheduling workflows with privacy protection constraints for big data applications on cloud
|
Wen, Yiping |
|
|
108 |
C |
p. 1084-1091 |
artikel |
90 |
Secure and efficient outsourcing differential privacy data release scheme in Cyber–physical system
|
Ye, Heng |
|
|
108 |
C |
p. 1314-1323 |
artikel |
91 |
Securing Cognitive Radio Networks using blockchains
|
Sajid, Adnan |
|
|
108 |
C |
p. 816-826 |
artikel |
92 |
Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework
|
Tewari, Aakanksha |
|
|
108 |
C |
p. 909-920 |
artikel |
93 |
Self-adapting cloud services orchestration for fulfilling intensive sensory data-driven IoT workflows
|
Adel Serhani, M. |
|
|
108 |
C |
p. 583-597 |
artikel |
94 |
Series mining for public safety advancement in emerging smart cities
|
Isafiade, Omowunmi E. |
|
|
108 |
C |
p. 777-802 |
artikel |
95 |
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems
|
Zhang, Zhiwei |
|
|
108 |
C |
p. 1338-1349 |
artikel |
96 |
Smart building creation in large scale HVAC environments through automated fault detection and diagnosis
|
Dey, Maitreyee |
|
|
108 |
C |
p. 950-966 |
artikel |
97 |
Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis
|
Mishra, Sandhya |
|
|
108 |
C |
p. 803-815 |
artikel |
98 |
Social-viewport adaptive caching scheme with clustering for virtual reality streaming in an edge computing platform
|
Yang, Yousung |
|
|
108 |
C |
p. 424-431 |
artikel |
99 |
Solving the dynamic energy aware job shop scheduling problem with the heterogeneous parallel genetic algorithm
|
Luo, Jia |
|
|
108 |
C |
p. 119-134 |
artikel |
100 |
Special issue: Cognitive Internet of Things assisted by cloud computing and big data
|
Zhang, Yin |
|
|
108 |
C |
p. 1214-1216 |
artikel |
101 |
Tera-scale coordinate descent on GPUs
|
Parnell, Thomas |
|
|
108 |
C |
p. 1173-1191 |
artikel |
102 |
The influence of semantic link network on the ability of question-answering system
|
Xu, Bei |
|
|
108 |
C |
p. 1-14 |
artikel |
103 |
Towards smarter cities: Learning from Internet of Multimedia Things-generated big data
|
Bellavista, Paolo |
|
|
108 |
C |
p. 879-881 |
artikel |
104 |
Transformer fault diagnosis method using IoT based monitoring system and ensemble machine learning
|
Zhang, Chaolong |
|
|
108 |
C |
p. 533-545 |
artikel |
105 |
ULAMA: A Utilization-Aware Matching Approach for robust on-demand spatial service brokers
|
Ali, Reem Y. |
|
|
108 |
C |
p. 1030-1048 |
artikel |