nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A data skew-based unknown traffic classification approach for TLS applications
|
He, Huijie |
|
|
138 |
C |
p. 1-12 |
artikel |
2 |
A feature-based survey of Fog modeling languages
|
Alidra, Abdelghani |
|
|
138 |
C |
p. 104-119 |
artikel |
3 |
A secure optimal placement strategy based on Monte Carlo simulation and hypothesis testing
|
Thabet, Marwa |
|
|
138 |
C |
p. 89-103 |
artikel |
4 |
Blockchain search engine: Its current research status and future prospect in Internet of Things network
|
Tang, Jine |
|
|
138 |
C |
p. 120-141 |
artikel |
5 |
BSMD:A blockchain-based secure storage mechanism for big spatio-temporal data
|
Ren, Yongjun |
|
|
138 |
C |
p. 328-338 |
artikel |
6 |
Cloud White: Detecting and Estimating QoS Degradation of Latency-Critical Workloads in the Public Cloud
|
Pons, Lucía |
|
|
138 |
C |
p. 13-25 |
artikel |
7 |
Corrigendum to “Region aware dynamic task scheduling and resource virtualization for load balancing in IoT–fog multi-cloud environment” [Future Gener. Comput. Syst. 137C (2022) 70–86]
|
Kanbar, Asan Baker |
|
|
138 |
C |
p. 212 |
artikel |
8 |
Cost-effective stochastic resource placement in edge clouds with horizontal and vertical sharing
|
Wei, Wei |
|
|
138 |
C |
p. 213-225 |
artikel |
9 |
Cost-efficient auto-scaling of container-based elastic processes
|
Sheganaku, Gerta |
|
|
138 |
C |
p. 296-312 |
artikel |
10 |
Editorial Board
|
|
|
|
138 |
C |
p. ii |
artikel |
11 |
FedSup: A communication-efficient federated learning fatigue driving behaviors supervision approach
|
Zhao, Chen |
|
|
138 |
C |
p. 52-60 |
artikel |
12 |
HEGrid: A high efficient multi-channel radio astronomical data gridding framework in heterogeneous computing environments
|
Wang, Hao |
|
|
138 |
C |
p. 243-253 |
artikel |
13 |
Internet of wearable things: Advancements and benefits from 6G technologies
|
Dao, Nhu-Ngoc |
|
|
138 |
C |
p. 172-184 |
artikel |
14 |
JACC-FPGA: A hardware accelerator for Jaccard similarity estimation using FPGAs in the cloud
|
Soto, Javier E. |
|
|
138 |
C |
p. 26-42 |
artikel |
15 |
Kriper: A blockchain network with permissioned storage
|
Rojo-Rivas, María Isabel |
|
|
138 |
C |
p. 160-171 |
artikel |
16 |
On the ICN-IoT with federated learning integration of communication: Concepts, security-privacy issues, applications, and future perspectives
|
Rahman, Anichur |
|
|
138 |
C |
p. 61-88 |
artikel |
17 |
pRIblast: A highly efficient parallel application for comprehensive lncRNA–RNA interaction prediction
|
Amatria-Barral, Iñaki |
|
|
138 |
C |
p. 270-279 |
artikel |
18 |
Privacy leakage of LoRaWAN smart parking occupancy sensors
|
Dujić Rodić, Lea |
|
|
138 |
C |
p. 142-159 |
artikel |
19 |
Reinforcement learning based monotonic policy for online resource allocation
|
Mishra, Pankaj |
|
|
138 |
C |
p. 313-327 |
artikel |
20 |
RMA-CPABE : A multi-authority CPABE scheme with reduced ciphertext size for IoT devices
|
Chaudhary, Chandan Kumar |
|
|
138 |
C |
p. 226-242 |
artikel |
21 |
Semantics-based privacy by design for Internet of Things applications
|
Alkhariji, Lamya |
|
|
138 |
C |
p. 280-295 |
artikel |
22 |
Sensor fusion for indoor positioning system through improved RSSI and PDR methods
|
Mehrabian, Hamidreza |
|
|
138 |
C |
p. 254-269 |
artikel |
23 |
SmartAuction: A blockchain-based secure implementation of private data queries
|
Zhang, Mengxiao |
|
|
138 |
C |
p. 198-211 |
artikel |
24 |
TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems
|
Debicha, Islam |
|
|
138 |
C |
p. 185-197 |
artikel |
25 |
The virtual machines scheduling strategy based on M/M/ c queueing model with vacation
|
Ma, Zhanyou |
|
|
138 |
C |
p. 43-51 |
artikel |