nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A double-blockchain solution for agricultural sampled data security in Internet of Things network
|
Ren, Wei |
|
|
117 |
C |
p. 453-461 |
artikel |
2 |
Aesthetic assessment of website design based on multimodal fusion
|
Liu, Xin |
|
|
117 |
C |
p. 433-438 |
artikel |
3 |
A fast and scalable authentication scheme in IOT for smart living
|
Li, Jianhua |
|
|
117 |
C |
p. 125-137 |
artikel |
4 |
Akka framework based on the Actor model for executing distributed Fog Computing applications
|
Srirama, Satish Narayana |
|
|
117 |
C |
p. 439-452 |
artikel |
5 |
An affective learning-based system for diagnosis and personalized management of diabetes mellitus
|
Omisore, Olatunji Mumini |
|
|
117 |
C |
p. 273-290 |
artikel |
6 |
An efficient identity-based proxy signcryption using lattice
|
Zhu, Hongfei |
|
|
117 |
C |
p. 321-327 |
artikel |
7 |
An ensemble machine learning approach through effective feature extraction to classify fake news
|
Hakak, Saqib |
|
|
117 |
C |
p. 47-58 |
artikel |
8 |
An evolutionary fuzzy scheduler for multi-objective resource allocation in fog computing
|
Wu, Chu-ge |
|
|
117 |
C |
p. 498-509 |
artikel |
9 |
An identification strategy for unknown attack through the joint learning of space–time features
|
Wang, Huan |
|
|
117 |
C |
p. 145-154 |
artikel |
10 |
An intelligent vehicle image segmentation and quality assessment model
|
Qu, Zehui |
|
|
117 |
C |
p. 426-432 |
artikel |
11 |
A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense
|
Dahiya, Amrita |
|
|
117 |
C |
p. 193-204 |
artikel |
12 |
Artificial intelligence for securing industrial-based cyber–physical systems
|
Lv, Zhihan |
|
|
117 |
C |
p. 291-298 |
artikel |
13 |
Chaotic improved PICEA-g-based multi-objective optimization for workflow scheduling in cloud environment
|
Paknejad, Peyman |
|
|
117 |
C |
p. 12-28 |
artikel |
14 |
Complicated robot activity recognition by quality-aware deep reinforcement learning
|
Li, Xing |
|
|
117 |
C |
p. 480-485 |
artikel |
15 |
Cryptographic Framework for Role Control Remedy: A Secure Role Engineering mechanism for Single Authority Organizations
|
Rashid, Aqsa |
|
|
117 |
C |
p. 245-258 |
artikel |
16 |
Data quality-aware task offloading in Mobile Edge Computing: An Optimal Stopping Theory approach
|
Alghamdi, Ibrahim |
|
|
117 |
C |
p. 462-479 |
artikel |
17 |
Deep Graph neural network-based spammer detection under the perspective of heterogeneous cyberspace
|
Guo, Zhiwei |
|
|
117 |
C |
p. 205-218 |
artikel |
18 |
Detecting impersonation attacks in cloud computing environments using a centric user profiling approach
|
Kholidy, Hisham A. |
|
|
117 |
C |
p. 299-320 |
artikel |
19 |
Dynamic fog-to-fog offloading in SDN-based fog computing systems
|
Phan, Linh-An |
|
|
117 |
C |
p. 486-497 |
artikel |
20 |
Editorial Board
|
|
|
|
117 |
C |
p. ii |
artikel |
21 |
Embedding reactive behavior into artifact-centric business process models
|
Oriol, Xavier |
|
|
117 |
C |
p. 97-110 |
artikel |
22 |
End-to-end online performance data capture and analysis for scientific workflows
|
Papadimitriou, George |
|
|
117 |
C |
p. 387-400 |
artikel |
23 |
Energy-aware scheduling in edge computing with a clustering method
|
Hao, Yongsheng |
|
|
117 |
C |
p. 259-272 |
artikel |
24 |
Entity-aware capsule network for multi-class classification of big data: A deep learning approach
|
Jaiswal, Amit Kumar |
|
|
117 |
C |
p. 1-11 |
artikel |
25 |
Formal approach to thwart against insider attacks: A bio-inspired auto-resilient policy regulation framework
|
Rauf, Usman |
|
|
117 |
C |
p. 412-425 |
artikel |
26 |
Future DNA computing device and accompanied tool stack: Towards high-throughput computation
|
Yan, Shankai |
|
|
117 |
C |
p. 111-124 |
artikel |
27 |
Graph convolutional networks for graphs containing missing features
|
Taguchi, Hibiki |
|
|
117 |
C |
p. 155-168 |
artikel |
28 |
Handwriting dynamics assessment using deep neural network for early identification of Parkinson’s disease
|
Kamran, Iqra |
|
|
117 |
C |
p. 234-244 |
artikel |
29 |
Hiding sensitive information in eHealth datasets
|
Wu, Jimmy Ming-Tai |
|
|
117 |
C |
p. 169-180 |
artikel |
30 |
Improving University Faculty Evaluations via multi-view Knowledge Graph
|
Lin, Qika |
|
|
117 |
C |
p. 181-192 |
artikel |
31 |
I-Scheduler: Iterative scheduling for distributed stream processing systems
|
Eskandari, Leila |
|
|
117 |
C |
p. 219-233 |
artikel |
32 |
Less-is-Better Protection (LBP) for memory errors in kNNs classifiers
|
Liu, Shanshan |
|
|
117 |
C |
p. 401-411 |
artikel |
33 |
Multi-view clustering toward aerial images by combining spectral analysis and local refinement
|
Xu, Yuanjin |
|
|
117 |
C |
p. 138-144 |
artikel |
34 |
Neural machine translating from natural language to SPARQL
|
Yin, Xiaoyu |
|
|
117 |
C |
p. 510-519 |
artikel |
35 |
Online cloud resource prediction via scalable window waveform sampling on classified workloads
|
Wang, Xiaogang |
|
|
117 |
C |
p. 338-358 |
artikel |
36 |
Predictive data analysis approach for securing medical data in smart grid healthcare systems
|
Tolba, Amr |
|
|
117 |
C |
p. 87-96 |
artikel |
37 |
Privacy-preserving blockchain-based federated learning for traffic flow prediction
|
Qi, Yuanhang |
|
|
117 |
C |
p. 328-337 |
artikel |
38 |
Self-improving system integration: Mastering continuous change
|
Bellman, Kirstie |
|
|
117 |
C |
p. 29-46 |
artikel |
39 |
SpecMiner: Heuristic-based mining of service behavioral models from interaction traces
|
Kabir, Muhammad Ashad |
|
|
117 |
C |
p. 59-71 |
artikel |
40 |
Time-constrained and network-aware containers scheduling in GPU era
|
Rodrigues, Leonardo Rosa |
|
|
117 |
C |
p. 72-86 |
artikel |
41 |
Towards user-centric, switching cost-aware fog node selection strategies
|
Rejiba, Zeineb |
|
|
117 |
C |
p. 359-368 |
artikel |
42 |
Using deep ensemble for influenza-like illness consultation rate prediction
|
Kristiani, Endah |
|
|
117 |
C |
p. 369-386 |
artikel |