nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
ABCDM: An Attention-based Bidirectional CNN-RNN Deep Model for sentiment analysis
|
Basiri, Mohammad Ehsan |
|
|
115 |
C |
p. 279-294 |
artikel |
2 |
Adaptive and aggressive transport protocol to provide QoS in cloud data exchange over Long Fat Networks
|
Briones, Alan |
|
|
115 |
C |
p. 34-44 |
artikel |
3 |
Adaptive live video streaming on low-cost wireless multihop networks for road traffic surveillance in smart cities
|
Felici-Castell, Santiago |
|
|
115 |
C |
p. 741-755 |
artikel |
4 |
A discrete PSO-based static load balancing algorithm for distributed simulations in a cloud environment
|
Miao, Zhang |
|
|
115 |
C |
p. 497-516 |
artikel |
5 |
A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic
|
Kumar, Adarsh |
|
|
115 |
C |
p. 1-19 |
artikel |
6 |
A feedback-based combinatorial fair economical double auction resource allocation model for cloud computing
|
Singhal, Ritu |
|
|
115 |
C |
p. 780-797 |
artikel |
7 |
Alzheimer’s disease progression detection model based on an early fusion of cost-effective multimodal data
|
El-Sappagh, Shaker |
|
|
115 |
C |
p. 680-699 |
artikel |
8 |
A metaheuristic method for joint task scheduling and virtual machine placement in cloud data centers
|
Alboaneen, Dabiah |
|
|
115 |
C |
p. 201-212 |
artikel |
9 |
An architecture to manage security operations for digital service chains
|
Repetto, Matteo |
|
|
115 |
C |
p. 251-266 |
artikel |
10 |
An automatic multi-view disease detection system via Collective Deep Region-based Feature Representation
|
Zhou, Jianhang |
|
|
115 |
C |
p. 59-75 |
artikel |
11 |
An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare
|
Zhong, Hong |
|
|
115 |
C |
p. 486-496 |
artikel |
12 |
A novel Machine Learning-based approach for the detection of SSH botnet infection
|
Martínez Garre, José Tomás |
|
|
115 |
C |
p. 387-396 |
artikel |
13 |
Applying k-vertex cardinality constraints on a Neo4j graph database
|
Šestak, Martina |
|
|
115 |
C |
p. 459-474 |
artikel |
14 |
ASiMOV: A self-protecting control application for the smart factory
|
Casalicchio, Emiliano |
|
|
115 |
C |
p. 213-235 |
artikel |
15 |
A survey on security and privacy of federated learning
|
Mothukuri, Viraaji |
|
|
115 |
C |
p. 619-640 |
artikel |
16 |
Autonomous mitigation of cyber risks in the Cyber–Physical Systems
|
Kholidy, Hisham A. |
|
|
115 |
C |
p. 171-187 |
artikel |
17 |
Communication-efficient certificate revocation management for Advanced Metering Infrastructure and IoT Integration
|
Cebe, Mumin |
|
|
115 |
C |
p. 267-278 |
artikel |
18 |
Configurable DSI partitioned approximate multiplier
|
Hajizadeh, Fahimeh |
|
|
115 |
C |
p. 100-114 |
artikel |
19 |
Cross-MapReduce: Data transfer reduction in geo-distributed MapReduce
|
Marzuni, Saeed Mirpour |
|
|
115 |
C |
p. 188-200 |
artikel |
20 |
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network
|
Imtiaz, Syed Ibrahim |
|
|
115 |
C |
p. 844-856 |
artikel |
21 |
Design and Implementation of Self-Protecting systems: A Formal Approach
|
Skandylas, Charilaos |
|
|
115 |
C |
p. 421-437 |
artikel |
22 |
Designing large quantum key distribution networks via medoid-based algorithms
|
García-Cobo, Iván |
|
|
115 |
C |
p. 814-824 |
artikel |
23 |
Discovering communities from disjoint complex networks using Multi-Layer Ant Colony Optimization
|
Imtiaz, Zar Bakht |
|
|
115 |
C |
p. 659-670 |
artikel |
24 |
EagleMine: Vision-guided Micro-clusters recognition and collective anomaly detection
|
Feng, Wenjie |
|
|
115 |
C |
p. 236-250 |
artikel |
25 |
Editorial Board
|
|
|
|
115 |
C |
p. ii |
artikel |
26 |
Editorial for FGCS special issue: Computation Intelligence for Energy Internet
|
Zhang, Yan |
|
|
115 |
C |
p. 295-297 |
artikel |
27 |
Efficient verifiable databases with additional insertion and deletion operations in cloud computing
|
Wang, Qiang |
|
|
115 |
C |
p. 553-567 |
artikel |
28 |
Energy and performance improvements in stencil computations on multi-node HPC systems with different network and communication topologies
|
Ciżnicki, Miłosz |
|
|
115 |
C |
p. 45-58 |
artikel |
29 |
Enforcing situation-aware access control to build malware-resilient file systems
|
McIntosh, Timothy |
|
|
115 |
C |
p. 568-582 |
artikel |
30 |
Estimation of laryngeal closure duration during swallowing without invasive X-rays
|
Mao, Shitong |
|
|
115 |
C |
p. 610-618 |
artikel |
31 |
Event prediction based on evolutionary event ontology knowledge
|
Mao, Qianren |
|
|
115 |
C |
p. 76-89 |
artikel |
32 |
Fast energy estimation framework for long-running applications
|
Salinas-Hilburg, Juan Carlos |
|
|
115 |
C |
p. 20-33 |
artikel |
33 |
Fetal cardiac cycle detection in multi-resource echocardiograms using hybrid classification framework
|
Pu, Bin |
|
|
115 |
C |
p. 825-836 |
artikel |
34 |
Finding rising stars through hot topics detection
|
Daud, Ali |
|
|
115 |
C |
p. 798-813 |
artikel |
35 |
Formal approach to thwart against drone discovery attacks: A taxonomy of novel 3D obfuscation mechanisms
|
Naeem, Faizana |
|
|
115 |
C |
p. 374-386 |
artikel |
36 |
Functional-realistic CT image super-resolution for early-stage pulmonary nodule detection
|
Zhu, Hongbo |
|
|
115 |
C |
p. 475-485 |
artikel |
37 |
How opinion distortion appears in super-influencer dominated social network
|
Wei, Jianliang |
|
|
115 |
C |
p. 542-552 |
artikel |
38 |
Improving I/O performance in distributed file systems for flash-based SSDs by access pattern reshaping
|
Kim, Sunggon |
|
|
115 |
C |
p. 365-373 |
artikel |
39 |
Improving malicious PDF classifier with feature engineering: A data-driven approach
|
Falah, Ahmed |
|
|
115 |
C |
p. 314-326 |
artikel |
40 |
Information flow perception modeling and optimization of Internet of Things for cloud services
|
Liu, Jian |
|
|
115 |
C |
p. 671-679 |
artikel |
41 |
Intelligent human hand gesture recognition by local–global fusing quality-aware features
|
Song, Tao |
|
|
115 |
C |
p. 298-303 |
artikel |
42 |
Internet of things forensic data analysis using machine learning to identify roots of data scavenging
|
Shakeel, P. Mohamed |
|
|
115 |
C |
p. 756-768 |
artikel |
43 |
Knowledge hypergraph-based approach for data integration and querying: Application to Earth Observation
|
Masmoudi, Maroua |
|
|
115 |
C |
p. 720-740 |
artikel |
44 |
LEChain: A blockchain-based lawful evidence management scheme for digital forensics
|
Li, Meng |
|
|
115 |
C |
p. 406-420 |
artikel |
45 |
LoRaMoto: A communication system to provide safety awareness among civilians after an earthquake
|
Pueyo Centelles, Roger |
|
|
115 |
C |
p. 150-170 |
artikel |
46 |
MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields
|
Guri, Mordechai |
|
|
115 |
C |
p. 115-125 |
artikel |
47 |
Multiple cloud storage mechanism based on blockchain in smart homes
|
Ren, Yongjun |
|
|
115 |
C |
p. 304-313 |
artikel |
48 |
Mutual teaching for graph convolutional networks
|
Zhan, Kun |
|
|
115 |
C |
p. 837-843 |
artikel |
49 |
NDN-based IoT with Edge computing
|
Wang, Xiaonan |
|
|
115 |
C |
p. 397-405 |
artikel |
50 |
Ontology based recommender system using social network data
|
Arafeh, Mohamad |
|
|
115 |
C |
p. 769-779 |
artikel |
51 |
Predictive methods in cyber defense: Current experience and research challenges
|
Husák, Martin |
|
|
115 |
C |
p. 517-530 |
artikel |
52 |
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection
|
Al-rimy, Bander Ali Saleh |
|
|
115 |
C |
p. 641-658 |
artikel |
53 |
Reliability in volunteer computing micro-blogging services
|
Bayliss, Christopher |
|
|
115 |
C |
p. 857-871 |
artikel |
54 |
Resilient composition of drone services for delivery
|
Shahzaad, Babar |
|
|
115 |
C |
p. 335-350 |
artikel |
55 |
RETRACTED: Intelligent edge computing based on machine learning for smart city
|
Lv, Zhihan |
|
|
115 |
C |
p. 90-99 |
artikel |
56 |
RIOMS: An intelligent system for operation and maintenance of urban roads using spatio-temporal data in smart cities
|
Yu, Gang |
|
|
115 |
C |
p. 583-609 |
artikel |
57 |
SDN-based cyber defense: A survey
|
Yurekten, Ozgur |
|
|
115 |
C |
p. 126-149 |
artikel |
58 |
SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures
|
Chen, Jing |
|
|
115 |
C |
p. 448-458 |
artikel |
59 |
Susceptible user search for defending opinion manipulation
|
Tang, Wenyi |
|
|
115 |
C |
p. 531-541 |
artikel |
60 |
TagSNP-set selection for genotyping using integrated data
|
Wang, Shudong |
|
|
115 |
C |
p. 327-334 |
artikel |
61 |
The application research of neural network and BP algorithm in stock price pattern classification and prediction
|
Zhang, Dehua |
|
|
115 |
C |
p. 872-879 |
artikel |
62 |
Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS
|
Makki, Majid |
|
|
115 |
C |
p. 351-364 |
artikel |
63 |
Time–frequency analysis of keystroke dynamics for user authentication
|
Toosi, Ramin |
|
|
115 |
C |
p. 438-447 |
artikel |
64 |
Unified programming concepts for unobtrusive integration of cloud-based and local parallel computing
|
Mehrabi, Mostafa |
|
|
115 |
C |
p. 700-719 |
artikel |