nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cyber-enabled visual inspection system for rail corrugation
|
Li, Qingyong |
|
2018 |
79 |
P1 |
p. 374-382 |
artikel |
2 |
Advance reservation access control using software-defined networking and tokens
|
Chung, Joaquin |
|
2018 |
79 |
P1 |
p. 225-234 |
artikel |
3 |
A learning automata-based ensemble resource usage prediction algorithm for cloud computing environment
|
Rahmanian, Ali Asghar |
|
2018 |
79 |
P1 |
p. 54-71 |
artikel |
4 |
A novel cost-efficient approach for deadline-constrained workflow scheduling by dynamic provisioning of resources
|
Singh, Vishakha |
|
2018 |
79 |
P1 |
p. 95-110 |
artikel |
5 |
A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems
|
Li, Xiaohong |
|
2018 |
79 |
P1 |
p. 417-430 |
artikel |
6 |
A novel statistical technique for intrusion detection systems
|
Kabir, Enamul |
|
2018 |
79 |
P1 |
p. 303-318 |
artikel |
7 |
An over-the-air key establishment protocol using keyless cryptography
|
Zhang, Yuexin |
|
2018 |
79 |
P1 |
p. 284-294 |
artikel |
8 |
ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks
|
Ma, Xindi |
|
2018 |
79 |
P1 |
p. 82-94 |
artikel |
9 |
Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM
|
M.A., Ajay Kumara |
|
2018 |
79 |
P1 |
p. 431-446 |
artikel |
10 |
Bridging the gap between peak and average loads on science networks
|
Nickolay, Sam |
|
2018 |
79 |
P1 |
p. 169-179 |
artikel |
11 |
Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps
|
D’Orazio, Christian J. |
|
2018 |
79 |
P1 |
p. 247-261 |
artikel |
12 |
Cloud computing based bushfire prediction for cyber–physical emergency applications
|
Garg, Saurabh |
|
2018 |
79 |
P1 |
p. 354-363 |
artikel |
13 |
Configuring in-memory cluster computing using random forest
|
Bei, Zhendong |
|
2018 |
79 |
P1 |
p. 1-15 |
artikel |
14 |
CoreFlow: Enriching Bro security events using network traffic monitoring data
|
Koning, Ralph |
|
2018 |
79 |
P1 |
p. 235-242 |
artikel |
15 |
Cybermatics: Advanced Strategy and Technology for Cyber-Enabled Systems and Applications
|
Zhou, Xiaokang |
|
2018 |
79 |
P1 |
p. 350-353 |
artikel |
16 |
Distributed data-driven platform for urgent decision making in cardiological ambulance control
|
Kovalchuk, Sergey V. |
|
2018 |
79 |
P1 |
p. 144-154 |
artikel |
17 |
Editorial Board
|
|
|
2018 |
79 |
P1 |
p. IFC |
artikel |
18 |
Editorial INDIS special section FGCS
|
Grosso, Paola |
|
2018 |
79 |
P1 |
p. 166-168 |
artikel |
19 |
Enabling intent to configure scientific networks for high performance demands
|
Kiran, Mariam |
|
2018 |
79 |
P1 |
p. 205-214 |
artikel |
20 |
Energy-efficient data transfers in radio astronomy with software UDP RDMA
|
Lenkiewicz, Przemyslaw |
|
2018 |
79 |
P1 |
p. 215-224 |
artikel |
21 |
Enhancing large-scale docking simulation on heterogeneous systems: An MPI vs rCUDA study
|
Imbernón, Baldomero |
|
2018 |
79 |
P1 |
p. 26-37 |
artikel |
22 |
Event recommendation in social networks based on reverse random walk and participant scale control
|
Mo, Yijun |
|
2018 |
79 |
P1 |
p. 383-395 |
artikel |
23 |
Geo-QTI: A quality aware truthful incentive mechanism for cyber–physical enabled Geographic crowdsensing
|
Dai, Wei |
|
2018 |
79 |
P1 |
p. 447-459 |
artikel |
24 |
Holistic approach to management of IT infrastructure for environmental monitoring and decision support systems with urgent computing capabilities
|
Balis, Bartosz |
|
2018 |
79 |
P1 |
p. 128-143 |
artikel |
25 |
Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network
|
Gupta, Shashank |
|
2018 |
79 |
P1 |
p. 319-336 |
artikel |
26 |
Integration of numerical model and cloud computing
|
Chen, Chong |
|
2018 |
79 |
P1 |
p. 396-407 |
artikel |
27 |
Maximizing the performance of scientific data transfer by optimizing the interface between parallel file systems and advanced research networks
|
Mills, Nicholas |
|
2018 |
79 |
P1 |
p. 190-198 |
artikel |
28 |
mdtmFTP and its evaluation on ESNET SDN testbed
|
Zhang, Liang |
|
2018 |
79 |
P1 |
p. 199-204 |
artikel |
29 |
Multimodel agent-based simulation environment for mass-gatherings and pedestrian dynamics
|
Karbovskii, Vladislav |
|
2018 |
79 |
P1 |
p. 155-165 |
artikel |
30 |
Network measurement for 100 GbE network links using multicore processors
|
Wu, Xiaoban |
|
2018 |
79 |
P1 |
p. 180-189 |
artikel |
31 |
Norm-based deontic logic for access control, some computational results
|
Sun, Xin |
|
2018 |
79 |
P1 |
p. 295-302 |
artikel |
32 |
Overlap community detection using spectral algorithm based on node convergence degree
|
Li, Weimin |
|
2018 |
79 |
P1 |
p. 408-416 |
artikel |
33 |
PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds
|
Wang, Huaqun |
|
2018 |
79 |
P1 |
p. 262-270 |
artikel |
34 |
PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system
|
Zhang, Chuan |
|
2018 |
79 |
P1 |
p. 16-25 |
artikel |
35 |
Price forecasting for spot instances in Cloud computing
|
Cai, Zhicheng |
|
2018 |
79 |
P1 |
p. 38-53 |
artikel |
36 |
Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat
|
Au, Man Ho |
|
2018 |
79 |
P1 |
p. 337-349 |
artikel |
37 |
Regression based performance modeling and provisioning for NoSQL cloud databases
|
Farias, Victor A.E. |
|
2018 |
79 |
P1 |
p. 72-81 |
artikel |
38 |
Reprint of “A robust reliable energy-aware urgent computing resource allocation for flash-flood ensemble forecasting on HPC infrastructures for decision support”
|
Leong, Siew Hoon |
|
2018 |
79 |
P1 |
p. 114-127 |
artikel |
39 |
Scalable and secure access control policy update for outsourced big data
|
Fugkeaw, Somchart |
|
2018 |
79 |
P1 |
p. 364-373 |
artikel |
40 |
Special Issue on Advanced Persistent Threat
|
Chen, Jiageng |
|
2018 |
79 |
P1 |
p. 243-246 |
artikel |
41 |
The flexible and privacy-preserving proximity detection in mobile social network
|
Ye, Ayong |
|
2018 |
79 |
P1 |
p. 271-283 |
artikel |
42 |
Urgent computing for decision support in critical situations
|
Boukhanovsky, Alexander V. |
|
2018 |
79 |
P1 |
p. 111-113 |
artikel |