nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A computational model to support in-network data analysis in federated ecosystems
|
Zamani, Ali Reza |
|
2018 |
80 |
C |
p. 342-354 |
artikel |
2 |
Adaptive composition in dynamic service environments
|
Barakat, Lina |
|
2018 |
80 |
C |
p. 215-228 |
artikel |
3 |
AFT: Adaptive and fault tolerant peer-to-peer overlay—A user-centric solution for data sharing
|
Poenaru, Andrei |
|
2018 |
80 |
C |
p. 583-595 |
artikel |
4 |
A novel face recognition algorithm via weighted kernel sparse representation
|
Liu, Xingang |
|
2018 |
80 |
C |
p. 653-663 |
artikel |
5 |
A robust and anonymous patient monitoring system using wireless medical sensor networks
|
Amin, Ruhul |
|
2018 |
80 |
C |
p. 483-495 |
artikel |
6 |
A service-oriented framework for collating retail intelligence
|
Anderson, Mark |
|
2018 |
80 |
C |
p. 400-408 |
artikel |
7 |
A Sybil attack detection scheme for a forest wildfire monitoring application
|
Jan, Mian Ahmad |
|
2018 |
80 |
C |
p. 613-626 |
artikel |
8 |
A traceability chain algorithm for artificial neural networks using T–S fuzzy cognitive maps in blockchain
|
Chen, Rui-Yang |
|
2018 |
80 |
C |
p. 198-210 |
artikel |
9 |
Automatic security verification of mobile app configurations
|
Costa, Gabriele |
|
2018 |
80 |
C |
p. 519-536 |
artikel |
10 |
BPMN 2.0: The state of support and implementation
|
Geiger, Matthias |
|
2018 |
80 |
C |
p. 250-262 |
artikel |
11 |
Cloud-based scalable object detection and classification in video streams
|
Yaseen, Muhammad Usman |
|
2018 |
80 |
C |
p. 286-298 |
artikel |
12 |
Eagle+: A fast incremental approach to automaton and table online updates for cloud services
|
Li, Jianxin |
|
2018 |
80 |
C |
p. 275-285 |
artikel |
13 |
Editorial Board
|
|
|
2018 |
80 |
C |
p. IFC |
artikel |
14 |
Efficient finer-grained incremental processing with MapReduce for big data
|
Zhang, Liang |
|
2018 |
80 |
C |
p. 102-111 |
artikel |
15 |
Energy-aware and multi-resource overload probability constraint-based virtual machine dynamic consolidation method
|
Li, Zhihua |
|
2018 |
80 |
C |
p. 139-156 |
artikel |
16 |
Energy-aware composition for wireless sensor networks as a service
|
Zhou, Zhangbing |
|
2018 |
80 |
C |
p. 299-310 |
artikel |
17 |
Evaluation of transaction authentication methods for online banking
|
Kiljan, Sven |
|
2018 |
80 |
C |
p. 430-447 |
artikel |
18 |
Expert system for nutrition care process of older adults
|
Cioara, Tudor |
|
2018 |
80 |
C |
p. 368-383 |
artikel |
19 |
Forensic engineering for resolving ownership problem of reusable IP core generated during high level synthesis
|
Sengupta, Anirban |
|
2018 |
80 |
C |
p. 29-46 |
artikel |
20 |
Full integrity and freshness for cloud data
|
Jin, Hao |
|
2018 |
80 |
C |
p. 640-652 |
artikel |
21 |
HB + DB : Distance bounding meets human based authentication
|
Pagnin, Elena |
|
2018 |
80 |
C |
p. 627-639 |
artikel |
22 |
Information-centric framework for the Internet of Things (IoT): Traffic modeling & optimization
|
Al-Turjman, Fadi |
|
2018 |
80 |
C |
p. 63-75 |
artikel |
23 |
InOt-RePCoN: Forecasting user behavioural trend in large-scale cloud environments
|
Panneerselvam, John |
|
2018 |
80 |
C |
p. 322-341 |
artikel |
24 |
Loom: Complex large-scale visual insight for large hybrid IT infrastructure management
|
Brook, James |
|
2018 |
80 |
C |
p. 47-62 |
artikel |
25 |
Matching federation identities, the eduGAIN and STORK approach
|
Torroglosa, Elena |
|
2018 |
80 |
C |
p. 126-138 |
artikel |
26 |
MidSHM: A Middleware for WSN-based SHM Application using Service-Oriented Architecture
|
Sahni, Yuvraj |
|
2018 |
80 |
C |
p. 263-274 |
artikel |
27 |
Multimodal biometric Identity Based Encryption
|
Sarier, Neyire Deniz |
|
2018 |
80 |
C |
p. 112-125 |
artikel |
28 |
On the design and analysis of protocols for Personal Health Record storage on Personal Data Server devices
|
Belyaev, Kirill |
|
2018 |
80 |
C |
p. 467-482 |
artikel |
29 |
Owner based malware discrimination
|
Han, Lansheng |
|
2018 |
80 |
C |
p. 496-504 |
artikel |
30 |
Partitioning big graph with respect to arbitrary proportions in a streaming manner
|
Hu, Ke-kun |
|
2018 |
80 |
C |
p. 1-11 |
artikel |
31 |
Pattern graph tracking-based stock price prediction using big data
|
Jeon, Seungwoo |
|
2018 |
80 |
C |
p. 171-187 |
artikel |
32 |
Performance comparison of intrusion detection systems and application of machine learning to Snort system
|
Shah, Syed Ali Raza |
|
2018 |
80 |
C |
p. 157-170 |
artikel |
33 |
Privacy-based recommendation mechanism in mobile participatory sensing systems using crowdsourced users’ preferences
|
Liu, Rui |
|
2018 |
80 |
C |
p. 76-88 |
artikel |
34 |
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry
|
Qiu, Meikang |
|
2018 |
80 |
C |
p. 421-429 |
artikel |
35 |
Programmable architecture based on Software Defined Network for Internet of Things: Connected Dominated Sets approach
|
Bendouda, Djamila |
|
2018 |
80 |
C |
p. 188-197 |
artikel |
36 |
QoS-aware automatic syntactic service composition problem: Complexity and resolution
|
Gabrel, Virginie |
|
2018 |
80 |
C |
p. 311-321 |
artikel |
37 |
Reprint of “LBBSRT: An efficient SDN load balancing scheme based on server response time”
|
Zhong, Hong |
|
2018 |
80 |
C |
p. 409-416 |
artikel |
38 |
Reprint of “You can’t touch this: Consumer-centric android application repackaging detection”
|
Gurulian, Iakovos |
|
2018 |
80 |
C |
p. 537-545 |
artikel |
39 |
Risk analysis of Android applications: A user-centric solution
|
Dini, Gianluca |
|
2018 |
80 |
C |
p. 505-518 |
artikel |
40 |
Secure and anonymous decentralized Bitcoin mixing
|
Ziegeldorf, Jan Henrik |
|
2018 |
80 |
C |
p. 448-466 |
artikel |
41 |
Security, privacy and trust of user-centric solutions
|
Akram, Raja Naeem |
|
2018 |
80 |
C |
p. 417-420 |
artikel |
42 |
Self-adaptive cloud monitoring with online anomaly detection
|
Wang, Tao |
|
2018 |
80 |
C |
p. 89-101 |
artikel |
43 |
Service-Oriented System Engineering
|
Bessis, Nik |
|
2018 |
80 |
C |
p. 211-214 |
artikel |
44 |
Single-pass based efficient erasable pattern mining using list data structure on dynamic incremental databases
|
Lee, Gangin |
|
2018 |
80 |
C |
p. 12-28 |
artikel |
45 |
S-InTime: A social cloud analytical service oriented system
|
Piccialli, Francesco |
|
2018 |
80 |
C |
p. 229-241 |
artikel |
46 |
Social collaborative service recommendation approach based on user’s trust and domain-specific expertise
|
Kalaï, Ahlem |
|
2018 |
80 |
C |
p. 355-367 |
artikel |
47 |
Speed control of mobile chargers serving wireless rechargeable networks
|
Chen, Feiyu |
|
2018 |
80 |
C |
p. 242-249 |
artikel |
48 |
Testing of transactional services in NoSQL key-value databases
|
González-Aparicio, María Teresa |
|
2018 |
80 |
C |
p. 384-399 |
artikel |
49 |
Time-based low emission zones preserving drivers’ privacy
|
Jardí-Cedó, Roger |
|
2018 |
80 |
C |
p. 558-571 |
artikel |
50 |
Trusted mobile computing: An overview of existing solutions
|
Bouazzouni, Mohamed Amine |
|
2018 |
80 |
C |
p. 596-612 |
artikel |
51 |
XSACd—Cross-domain resource sharing & access control for smart environments
|
Fysarakis, Konstantinos |
|
2018 |
80 |
C |
p. 572-582 |
artikel |
52 |
Your WiFi is leaking: What do your mobile apps gossip about you?
|
Atkinson, John S. |
|
2018 |
80 |
C |
p. 546-557 |
artikel |