nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Access network selection based on available bandwidth estimation for heterogeneous networks
|
Ochoa, Martha Hernandez |
|
|
78 |
C |
p. |
artikel |
2 |
A family of standards for software and systems product lines
|
Chimalakonda, Sridhar |
|
|
78 |
C |
p. |
artikel |
3 |
A taxonomy of attack mechanisms in the automotive domain
|
Pekaric, Irdin |
|
|
78 |
C |
p. |
artikel |
4 |
Context checklist for industrial software engineering research and practice
|
Petersen, Kai |
|
|
78 |
C |
p. |
artikel |
5 |
Editorial Board
|
|
|
|
78 |
C |
p. |
artikel |
6 |
Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications
|
Li, Xuran |
|
|
78 |
C |
p. |
artikel |
7 |
Injecting domain knowledge in multi-objective optimization problems: A semantic approach
|
Barba-González, Cristóbal |
|
|
78 |
C |
p. |
artikel |
8 |
Modelling web component quality using Delphi study
|
Lizcano, David |
|
|
78 |
C |
p. |
artikel |
9 |
On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications
|
Elahi, Haroon |
|
|
78 |
C |
p. |
artikel |
10 |
Performance evaluation of secured network traffic classification using a machine learning approach
|
Afuwape, Afeez Ajani |
|
|
78 |
C |
p. |
artikel |
11 |
Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud
|
Kanwal, Tehsin |
|
|
78 |
C |
p. |
artikel |
12 |
Public-key encryption with bidirectional keyword search and its application to encrypted emails
|
Zhang, Wenzheng |
|
|
78 |
C |
p. |
artikel |
13 |
Secure deduplication with efficient user revocation in cloud storage
|
Wang, Yunling |
|
|
78 |
C |
p. |
artikel |
14 |
Trusted data sharing with flexible access control based on blockchain
|
Ma, Xu |
|
|
78 |
C |
p. |
artikel |