nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A collaborative analysis method of user abnormal behavior based on reputation voting in cloud environment
|
Zheng, Ruijuan |
|
2018 |
83 |
C |
p. 60-74 |
artikel |
2 |
A conditional edge connectivity of double-orbit networks
|
Lin, Huiqiu |
|
2018 |
83 |
C |
p. 445-449 |
artikel |
3 |
A GSA based hybrid algorithm for bi-objective workflow scheduling in cloud computing
|
Choudhary, Anubhav |
|
2018 |
83 |
C |
p. 14-26 |
artikel |
4 |
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection
|
Huda, Shamsul |
|
2018 |
83 |
C |
p. 193-207 |
artikel |
5 |
A hybrid quantum-induced swarm intelligence clustering for the urban trip recommendation in smart city
|
Logesh, R. |
|
2018 |
83 |
C |
p. 653-673 |
artikel |
6 |
Analyzing the structure of Java software systems by weighted K -core decomposition
|
Pan, Weifeng |
|
2018 |
83 |
C |
p. 431-444 |
artikel |
7 |
An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework
|
Memos, Vasileios A. |
|
2018 |
83 |
C |
p. 619-628 |
artikel |
8 |
An efficient latency monitoring scheme in software defined networks
|
Zhang, Wei |
|
2018 |
83 |
C |
p. 303-309 |
artikel |
9 |
An insertion–deletion–compensation model with Poisson process for scale-free networks
|
Li, Jinqiang |
|
2018 |
83 |
C |
p. 425-430 |
artikel |
10 |
An intelligent, uncertainty driven management scheme for software updates in pervasive IoT applications
|
Kolomvatsos, Kostas |
|
2018 |
83 |
C |
p. 116-131 |
artikel |
11 |
An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres
|
Panneerselvam, John |
|
2018 |
83 |
C |
p. 239-249 |
artikel |
12 |
A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining
|
Radhakrishna, Vangipuram |
|
2018 |
83 |
C |
p. 582-595 |
artikel |
13 |
AODV routing protocol for Cognitive radio access based Internet of Things (IoT)
|
Anamalamudi, Satish |
|
2018 |
83 |
C |
p. 228-238 |
artikel |
14 |
A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city
|
Li, Xiong |
|
2018 |
83 |
C |
p. 607-618 |
artikel |
15 |
A tree search algorithm for low multiplicative complexity logic design
|
Tay, Jia Jun |
|
2018 |
83 |
C |
p. 132-143 |
artikel |
16 |
Centrality measures for evacuation: Finding agile evacuation routes
|
Lujak, Marin |
|
2018 |
83 |
C |
p. 401-412 |
artikel |
17 |
Cloud-assisted secure video transmission and sharing framework for smart cities
|
Hossain, M. Shamim |
|
2018 |
83 |
C |
p. 596-606 |
artikel |
18 |
Correlation of cascade failures and centrality measures in complex networks
|
Ghanbari, Ryan |
|
2018 |
83 |
C |
p. 390-400 |
artikel |
19 |
Correlation power analysis of modes of encryption in AES and its countermeasures
|
Fahd, Shah |
|
2018 |
83 |
C |
p. 496-509 |
artikel |
20 |
DPRank centrality: Finding important vertices based on random walks with a new defined transition matrix
|
Liu, Min |
|
2018 |
83 |
C |
p. 376-389 |
artikel |
21 |
DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing
|
Lin, Hui |
|
2018 |
83 |
C |
p. 293-302 |
artikel |
22 |
3D visual discomfort predictor based on subjective perceived-constraint sparse representation in 3D display system
|
Xu, Haiyong |
|
2018 |
83 |
C |
p. 85-94 |
artikel |
23 |
Dynamic metric embedding model for point-of-interest prediction
|
Liu, Wei |
|
2018 |
83 |
C |
p. 183-192 |
artikel |
24 |
Dynamic risk management response system to handle cyber threats
|
Gonzalez-Granadillo, G. |
|
2018 |
83 |
C |
p. 535-552 |
artikel |
25 |
Editorial Board
|
|
|
2018 |
83 |
C |
p. ii |
artikel |
26 |
Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things
|
Han, Qi |
|
2018 |
83 |
C |
p. 269-277 |
artikel |
27 |
Efficient hybrid multicast approach in wireless data center network
|
Zhu, Longting |
|
2018 |
83 |
C |
p. 27-36 |
artikel |
28 |
Energy-efficient virtual content distribution network provisioning in cloud-based data centers
|
Liao, Dan |
|
2018 |
83 |
C |
p. 347-357 |
artikel |
29 |
FAMOUS: Forensic Analysis of MObile devices Using Scoring of application permissions
|
Kumar, Ajit |
|
2018 |
83 |
C |
p. 158-172 |
artikel |
30 |
Fog-based storage technology to fight with cyber threat
|
Wang, Tian |
|
2018 |
83 |
C |
p. 208-218 |
artikel |
31 |
Gait and tremor investigation using machine learning techniques for the diagnosis of Parkinson disease
|
Abdulhay, Enas |
|
2018 |
83 |
C |
p. 366-373 |
artikel |
32 |
Hardware design and modeling of lightweight block ciphers for secure communications
|
Mohd, Bassam Jamil |
|
2018 |
83 |
C |
p. 510-521 |
artikel |
33 |
HEPart: A balanced hypergraph partitioning algorithm for big data applications
|
Yang, Wenyin |
|
2018 |
83 |
C |
p. 250-268 |
artikel |
34 |
Information reliability in complex multitask networks
|
Monajemi, Sadaf |
|
2018 |
83 |
C |
p. 485-495 |
artikel |
35 |
In-memory big data analytics under space constraints using dynamic programming
|
Gai, Keke |
|
2018 |
83 |
C |
p. 219-227 |
artikel |
36 |
JobPruner: A machine learning assistant for exploring parameter spaces in HPC applications
|
Silva, Bruno |
|
2018 |
83 |
C |
p. 144-157 |
artikel |
37 |
LayerMover: Fast virtual machine migration over WAN with three-layer image structure
|
Zhang, Fei |
|
2018 |
83 |
C |
p. 37-49 |
artikel |
38 |
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment
|
Gope, Prosanta |
|
2018 |
83 |
C |
p. 629-637 |
artikel |
39 |
Matching user accounts based on user generated content across social networks
|
Li, Yongjun |
|
2018 |
83 |
C |
p. 104-115 |
artikel |
40 |
Measurements and security of complex networks and systems: Research advances and challenges
|
Choo, Kim-Kwang Raymond |
|
2018 |
83 |
C |
p. 374-375 |
artikel |
41 |
Model-based sensitivity analysis of IaaS cloud availability
|
Liu, Bo |
|
2018 |
83 |
C |
p. 1-13 |
artikel |
42 |
Model matching of input/output asynchronous sequential machines based on the semi-tensor product of matrices
|
Wang, Jingjing |
|
2018 |
83 |
C |
p. 468-475 |
artikel |
43 |
Monitoring of pet animal in smart cities using animal biometrics
|
Kumar, Santosh |
|
2018 |
83 |
C |
p. 553-563 |
artikel |
44 |
Multipolarization versus unification in community networks
|
Fu, Jingcheng |
|
2018 |
83 |
C |
p. 454-460 |
artikel |
45 |
Multi-scale image fusion through rolling guidance filter
|
Jian, Lihua |
|
2018 |
83 |
C |
p. 310-325 |
artikel |
46 |
On security challenges and open issues in Internet of Things
|
Sha, Kewei |
|
2018 |
83 |
C |
p. 326-337 |
artikel |
47 |
Personalized location prediction for group travellers from spatial–temporal trajectories
|
Naserian, Elahe |
|
2018 |
83 |
C |
p. 278-292 |
artikel |
48 |
ppXen: A hypervisor CPU scheduler for mitigating performance variability in virtualized clouds
|
Asyabi, Esmail |
|
2018 |
83 |
C |
p. 75-84 |
artikel |
49 |
QRE: Quick Robustness Estimation for large complex networks
|
Wandelt, Sebastian |
|
2018 |
83 |
C |
p. 413-424 |
artikel |
50 |
Real-time secure communication for Smart City in high-speed Big Data environment
|
Rathore, M. Mazhar |
|
2018 |
83 |
C |
p. 638-652 |
artikel |
51 |
Research on access control model of social network based on distributed logic
|
Ma, Li |
|
2018 |
83 |
C |
p. 173-182 |
artikel |
52 |
Rigorous or tolerant: The effect of different reputation attitudes in complex networks
|
Ren, Yizhi |
|
2018 |
83 |
C |
p. 476-484 |
artikel |
53 |
Rule acquisition and optimal scale selection in multi-scale formal decision contexts and their applications to smart city
|
Xie, Junping |
|
2018 |
83 |
C |
p. 564-581 |
artikel |
54 |
Serverless computing for container-based architectures
|
Pérez, Alfonso |
|
2018 |
83 |
C |
p. 50-59 |
artikel |
55 |
SocioScope: A framework for understanding Internet of Social Knowledge
|
Nguyen, Hoang Long |
|
2018 |
83 |
C |
p. 358-365 |
artikel |
56 |
Spectrum bounds for the scattering number, integrity, tenacity of regular graphs
|
Li, Yinkui |
|
2018 |
83 |
C |
p. 450-453 |
artikel |
57 |
Super-resolution of retinal images using multi-kernel SVR for IoT healthcare applications
|
Jebadurai, Jebaveerasingh |
|
2018 |
83 |
C |
p. 338-346 |
artikel |
58 |
Symmetric graphs and interconnection networks
|
Li, Jing Jian |
|
2018 |
83 |
C |
p. 461-467 |
artikel |
59 |
Timetable-aware opportunistic DTN routing for vehicular communications in battlefield environments
|
Wang, Haitao |
|
2018 |
83 |
C |
p. 95-103 |
artikel |
60 |
Wireless Integrated Sensor Network: Boundary Intellect system for elephant detection via cognitive theory and Fuzzy Cognitive Maps
|
Anni, Jerline Sheebha |
|
2018 |
83 |
C |
p. 522-534 |
artikel |