nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Achieving security-by-design through ontology-driven attribute-based access control in cloud environments
|
Veloudis, Simeon |
|
|
93 |
C |
p. 373-391 |
artikel |
2 |
A data-locality-aware task scheduler for distributed social graph queries
|
Jin, Jiahui |
|
|
93 |
C |
p. 1010-1022 |
artikel |
3 |
A hybrid multi criteria decision method for cloud service selection from Smart data
|
Al-Faifi, Abdullah |
|
|
93 |
C |
p. 43-57 |
artikel |
4 |
A Hybrid Real-time remote monitoring framework with NB-WOA algorithm for patients with chronic diseases
|
Hassan, Mohammed K. |
|
|
93 |
C |
p. 77-95 |
artikel |
5 |
A hybrid relay node selection scheme for message dissemination in VANETs
|
Rehman, Osama |
|
|
93 |
C |
p. 1-17 |
artikel |
6 |
A lightweight secure conjunctive keyword search scheme in hybrid cloud
|
He, Heng |
|
|
93 |
C |
p. 727-736 |
artikel |
7 |
A long video caption generation algorithm for big video data retrieval
|
Ding, Songtao |
|
|
93 |
C |
p. 583-595 |
artikel |
8 |
A methodological framework for cloud resource provisioning and scheduling of data parallel applications under uncertainty
|
Calzarossa, Maria Carla |
|
|
93 |
C |
p. 212-223 |
artikel |
9 |
A multi-projection deep computation model for smart data in Internet of Things
|
Bu, Fanyu |
|
|
93 |
C |
p. 68-76 |
artikel |
10 |
An algorithm for sink positioning in bus-assisted smart city sensing
|
Cruz, Pedro |
|
|
93 |
C |
p. 761-769 |
artikel |
11 |
An anonymization protocol for continuous and dynamic privacy-preserving data collection
|
Kim, Soohyung |
|
|
93 |
C |
p. 1065-1073 |
artikel |
12 |
An approach to identify user preferences based on social network analysis
|
Milovanović, Stevan |
|
|
93 |
C |
p. 121-129 |
artikel |
13 |
An edge-stream computing infrastructure for real-time analysis of wearable sensors data
|
Greco, Luca |
|
|
93 |
C |
p. 515-528 |
artikel |
14 |
A new fuzzy logic based node localization mechanism for Wireless Sensor Networks
|
Amri, Saber |
|
|
93 |
C |
p. 799-813 |
artikel |
15 |
Anomaly detection in wide area network meshes using two machine learning algorithms
|
Zhang, James |
|
|
93 |
C |
p. 418-426 |
artikel |
16 |
An overview of smartphone technology for citizen-centered, real-time and scalable civil infrastructure monitoring
|
Alavi, Amir H. |
|
|
93 |
C |
p. 651-672 |
artikel |
17 |
Application of clustering-based decision tree approach in SQL query error database
|
Lino, Adriano |
|
|
93 |
C |
p. 392-406 |
artikel |
18 |
A secure versatile light payment system based on blockchain
|
Zhong, Lin |
|
|
93 |
C |
p. 327-337 |
artikel |
19 |
A semantics-based approach to sensor data segmentation in real-time Activity Recognition
|
Triboan, Darpan |
|
|
93 |
C |
p. 224-236 |
artikel |
20 |
A smart coordinated temperature feedback controller for energy-efficient data centers
|
Zhao, Xiaogang |
|
|
93 |
C |
p. 506-514 |
artikel |
21 |
A swarm intelligence-based algorithm for the set-union knapsack problem
|
Ozsoydan, Fehmi Burcin |
|
|
93 |
C |
p. 560-569 |
artikel |
22 |
Automated classification of hand movements using tunable-Q wavelet transform based filter-bank with surface electromyogram signals
|
Nishad, Anurag |
|
|
93 |
C |
p. 96-110 |
artikel |
23 |
Automatic fine-grained access control in SCADA by machine learning
|
Zhou, Lu |
|
|
93 |
C |
p. 548-559 |
artikel |
24 |
Bayesian analysis model for the use of anesthetic analgesic drugs in cancer patients based on geometry reconstruction
|
Wu, Zhichao |
|
|
93 |
C |
p. 170-175 |
artikel |
25 |
BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks
|
Viegas, Eduardo |
|
|
93 |
C |
p. 473-485 |
artikel |
26 |
Category Preferred Canopy–K-means based Collaborative Filtering algorithm
|
Li, Jianjiang |
|
|
93 |
C |
p. 1046-1054 |
artikel |
27 |
Clickstream for learning analytics to assess students’ behavior with Scratch
|
Filvà, Daniel Amo |
|
|
93 |
C |
p. 673-686 |
artikel |
28 |
Compromised user credentials detection in a digital enterprise using behavioral analytics
|
Shah, Saleh |
|
|
93 |
C |
p. 407-417 |
artikel |
29 |
Context-aware access control with imprecise context characterization for cloud-based data resources
|
Kayes, A.S.M. |
|
|
93 |
C |
p. 237-255 |
artikel |
30 |
Corrigendum to “Fuzzy adaptive cognitive stimulation therapy generation for Alzheimer’s sufferers: Towards a pervasive dementia care monitoring platform” [Future Gener. Comput. Syst. 88 (2018) 479–490]
|
Navarro, Javier |
|
|
93 |
C |
p. 1074-1075 |
artikel |
31 |
Cyber security framework for Internet of Things-based Energy Internet
|
Sani, Abubakar Sadiq |
|
|
93 |
C |
p. 849-859 |
artikel |
32 |
Design and evaluation of a scalable smart city software platform with large-scale simulations
|
de M. Del Esposte, Arthur |
|
|
93 |
C |
p. 427-441 |
artikel |
33 |
Distributed machine learning cloud teleophthalmology IoT for predicting AMD disease progression
|
Das, Arun |
|
|
93 |
C |
p. 486-498 |
artikel |
34 |
Distributed temporal link prediction algorithm based on label propagation
|
Xu, Xiaolong |
|
|
93 |
C |
p. 627-636 |
artikel |
35 |
Editorial Board
|
|
|
|
93 |
C |
p. ii |
artikel |
36 |
Efficient data request answering in vehicular Ad-hoc networks based on fog nodes and filters
|
Lai, Yongxuan |
|
|
93 |
C |
p. 130-142 |
artikel |
37 |
EKF-MRPL: Advanced mobility support routing protocol for internet of mobile things: Movement prediction approach
|
Bouaziz, Maha |
|
|
93 |
C |
p. 822-832 |
artikel |
38 |
Emulating home automation installations through component-based web technology
|
Asensio, J.A. |
|
|
93 |
C |
p. 777-791 |
artikel |
39 |
Energy-aware cost prediction and pricing of virtual machines in cloud computing environments
|
Aldossary, Mohammad |
|
|
93 |
C |
p. 442-459 |
artikel |
40 |
Energy efficient fog-assisted IoT system for monitoring diabetic patients with cardiovascular disease
|
Nguyen Gia, Tuan |
|
|
93 |
C |
p. 198-211 |
artikel |
41 |
Evaluating the benefits of using proactive transformed-domain-based techniques in fraud detection tasks
|
Saia, Roberto |
|
|
93 |
C |
p. 18-32 |
artikel |
42 |
Evaluation of virtualization and traffic filtering methods for container networks
|
Makowski, Łukasz |
|
|
93 |
C |
p. 345-357 |
artikel |
43 |
Evidence identification in IoT networks based on threat assessment
|
Akatyev, Nikolay |
|
|
93 |
C |
p. 814-821 |
artikel |
44 |
Fog-Based Data Distribution Service (F-DAD) for Internet of Things (IoT) applications
|
Karatas, Firat |
|
|
93 |
C |
p. 156-169 |
artikel |
45 |
GMA: An adult account identification algorithm on Sina Weibo using behavioral footprints
|
Wang, Lei |
|
|
93 |
C |
p. 942-951 |
artikel |
46 |
Implementation of a real-time network traffic monitoring service with network functions virtualization
|
Yang, Chao-Tung |
|
|
93 |
C |
p. 687-701 |
artikel |
47 |
Intelligent defense using pretense against targeted attacks in cloud platforms
|
Neupane, Roshan Lal |
|
|
93 |
C |
p. 609-626 |
artikel |
48 |
Interference graphs to monitor and control schedules in low-power WPAN
|
van der Lee, Tim |
|
|
93 |
C |
p. 111-120 |
artikel |
49 |
Lifetime-aware FTL to improve the lifetime and performance of solid-state drives
|
Pan, Yubiao |
|
|
93 |
C |
p. 58-67 |
artikel |
50 |
LSTM-EFG for wind power forecasting based on sequential correlation features
|
Yu, Ruiguo |
|
|
93 |
C |
p. 33-42 |
artikel |
51 |
Managing energy, performance and cost in large scale heterogeneous datacenters using migrations
|
Zakarya, Muhammad |
|
|
93 |
C |
p. 529-547 |
artikel |
52 |
Minimizing cost and makespan for workflow scheduling in cloud using fuzzy dominance sort based HEFT
|
Zhou, Xiumin |
|
|
93 |
C |
p. 278-289 |
artikel |
53 |
Modeling multi-aspects within one opinionated sentence simultaneously for aspect-level sentiment analysis
|
Ma, Xiao |
|
|
93 |
C |
p. 304-311 |
artikel |
54 |
Modified genetic optimization-based locally weighted learning identification modeling of ship maneuvering with full scale trial
|
Bai, Weiwei |
|
|
93 |
C |
p. 1036-1045 |
artikel |
55 |
mrMoulder: A recommendation-based adaptive parameter tuning approach for big data processing platform
|
Cai, Lin |
|
|
93 |
C |
p. 570-582 |
artikel |
56 |
Multi-criteria optimal task allocation at the edge
|
Kolomvatsos, Kostas |
|
|
93 |
C |
p. 358-372 |
artikel |
57 |
Multidimensional privacy preservation in location-based services
|
Peng, Tao |
|
|
93 |
C |
p. 312-326 |
artikel |
58 |
Multilevel learning based modeling for link prediction and users’ consumption preference in Online Social Networks
|
Sharma, Pradip Kumar |
|
|
93 |
C |
p. 952-961 |
artikel |
59 |
Multi modal registration of structural features and mutual information of medical image
|
Xu, Yi |
|
|
93 |
C |
p. 499-505 |
artikel |
60 |
NDN-over-ZigBee: A ZigBee support for Named Data Networking
|
Abane, Amar |
|
|
93 |
C |
p. 792-798 |
artikel |
61 |
Negative sign prediction for signed social networks
|
Yuan, Weiwei |
|
|
93 |
C |
p. 962-970 |
artikel |
62 |
Nuoxus: A proactive caching model to manage multimedia content distribution on fog radio access networks
|
Costa, Felipe Rabuske |
|
|
93 |
C |
p. 143-155 |
artikel |
63 |
On arrival scheduling of real-time precedence constrained tasks on multi-processor systems using genetic algorithm
|
Muhuri, Pranab K. |
|
|
93 |
C |
p. 702-726 |
artikel |
64 |
Optimal power/rate trade-off for internet of multimedia things lifetime maximization under dynamic links capacity
|
Khernane, Nesrine |
|
|
93 |
C |
p. 737-750 |
artikel |
65 |
Optimistic virtual machine placement in cloud data centers using queuing approach
|
Ponraj, Anitha |
|
|
93 |
C |
p. 338-344 |
artikel |
66 |
Optimizing the cost of DBaaS object placement in hybrid storage systems
|
Boukhelef, Djillali |
|
|
93 |
C |
p. 176-187 |
artikel |
67 |
Privacy by Architecture Pseudonym Framework for Delay Tolerant Network
|
Ahmad, Naveed |
|
|
93 |
C |
p. 979-992 |
artikel |
68 |
Privacy-preserved community discovery in online social networks
|
Zheng, Xu |
|
|
93 |
C |
p. 1002-1009 |
artikel |
69 |
Provably secure key-aggregate cryptosystems with auxiliary inputs for data sharing on the cloud
|
Wang, Zhiwei |
|
|
93 |
C |
p. 770-776 |
artikel |
70 |
QoS improvisation of delay sensitive communication using SDN based multipath routing for medical applications
|
Venkatesh, K. |
|
|
93 |
C |
p. 256-265 |
artikel |
71 |
Resource-aware relay selection for inter-cell interference avoidance in 5G heterogeneous network for Internet of Things systems
|
Dao, Nhu-Ngoc |
|
|
93 |
C |
p. 877-887 |
artikel |
72 |
RETRACTED: Corrigendum to “A framework for risk assessment, management and evaluation: Economic tool for quantifying risks in supply chain” [Future Gener. Comput. Syst. 90 (2019) 489–502]
|
Abdel-Basset, Mohamed |
|
|
93 |
C |
p. 1076-1077 |
artikel |
73 |
SAND: Social-aware, network-failure resilient, and decentralized microblogging system
|
Ding, Ding |
|
|
93 |
C |
p. 637-650 |
artikel |
74 |
Scalable distributed control plane for On-line social networks support cognitive neural computing in software defined networks
|
Liao, Lingxia |
|
|
93 |
C |
p. 993-1001 |
artikel |
75 |
SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
|
Airehrour, David |
|
|
93 |
C |
p. 860-876 |
artikel |
76 |
Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions
|
Plaga, Sven |
|
|
93 |
C |
p. 596-608 |
artikel |
77 |
Security enhancement on an RFID ownership transfer protocol based on cloud
|
Lee, Cheng-Chi |
|
|
93 |
C |
p. 266-277 |
artikel |
78 |
SEIM: Search economics for influence maximization in online social networks
|
Tsai, Chun-Wei |
|
|
93 |
C |
p. 1055-1064 |
artikel |
79 |
Short-term traffic flow prediction in smart multimedia system for Internet of Vehicles based on deep belief network
|
Kong, Fanhui |
|
|
93 |
C |
p. 460-472 |
artikel |
80 |
Social acquaintance based routing in Vehicular Social Networks
|
Rahim, Azizur |
|
|
93 |
C |
p. 751-760 |
artikel |
81 |
SOS: A multimedia recommender System for Online Social networks
|
Amato, Flora |
|
|
93 |
C |
p. 914-923 |
artikel |
82 |
SpEED-IoT: Spectrum aware energy efficient routing for device-to-device IoT communication
|
Debroy, Saptarshi |
|
|
93 |
C |
p. 833-848 |
artikel |
83 |
Statistical analysis of risk assessment factors and metrics to evaluate radicalisation in Twitter
|
Lara-Cabrera, Raúl |
|
|
93 |
C |
p. 971-978 |
artikel |
84 |
Subevents detection through topic modeling in social media posts
|
Nolasco, Diogo |
|
|
93 |
C |
p. 290-303 |
artikel |
85 |
Taming the IoT data deluge: An innovative information-centric service model for fog computing applications
|
Tortonesi, Mauro |
|
|
93 |
C |
p. 888-902 |
artikel |
86 |
Time-aware adaptive tweets ranking through deep learning
|
De Maio, Carmen |
|
|
93 |
C |
p. 924-932 |
artikel |
87 |
TimeTrustSVD: A collaborative filtering model integrating time, trust and rating information
|
Tong, Chao |
|
|
93 |
C |
p. 933-941 |
artikel |
88 |
Traceable-then-revocable ciphertext-policy attribute-based encryption scheme
|
Liu, Zhenhua |
|
|
93 |
C |
p. 903-913 |
artikel |
89 |
Unicorn: Unified resource orchestration for multi-domain, geo-distributed data analytics
|
Xiang, Qiao |
|
|
93 |
C |
p. 188-197 |
artikel |
90 |
User behavior prediction in social networks using weighted extreme learning machine with distribution optimization
|
Luo, Xiong |
|
|
93 |
C |
p. 1023-1035 |
artikel |