nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A dual auditing protocol for fine-grained access control in the edge-cloud-based smart home
|
Zhang, XiaoXu |
|
|
228 |
C |
p. |
artikel |
2 |
A novel abstraction for security configuration in virtual networks
|
Bringhenti, Daniele |
|
|
228 |
C |
p. |
artikel |
3 |
An overview of analysis methods and evaluation results for caching strategies
|
Hasslinger, Gerhard |
|
|
228 |
C |
p. |
artikel |
4 |
CAIN: An energy-aware and intelligent increasing coverage area routing protocol for future 6G networks
|
Marinho, Ricardo Pagoto |
|
|
228 |
C |
p. |
artikel |
5 |
Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation
|
Lin, Po-Ching |
|
|
228 |
C |
p. |
artikel |
6 |
Coupon Filter: A Universal and Lightweight Filter Framework for More Accurate Data Stream Processing
|
Wu, Xiaocan |
|
|
228 |
C |
p. |
artikel |
7 |
Deep reinforcement learning for next-generation IoT networks
|
Garg, Sahil |
|
|
228 |
C |
p. |
artikel |
8 |
Delay optimal for reliability-guaranteed concurrent transmissions with raptor code in multi-access 6G edge network
|
Guo, Zhongfu |
|
|
228 |
C |
p. |
artikel |
9 |
Dynamic logic-based attack graph for risk assessment in complex computer systems
|
Boudermine, Antoine |
|
|
228 |
C |
p. |
artikel |
10 |
Editorial Board
|
|
|
|
228 |
C |
p. |
artikel |
11 |
Efficient intrusion detection toward IoT networks using cloud–edge collaboration
|
Yang, Run |
|
|
228 |
C |
p. |
artikel |
12 |
Few-shot encrypted traffic classification via multi-task representation enhanced meta-learning
|
Yang, Chen |
|
|
228 |
C |
p. |
artikel |
13 |
Going beyond RF: A survey on how AI-enabled multimodal beamforming will shape the NextG standard
|
Roy, Debashri |
|
|
228 |
C |
p. |
artikel |
14 |
Grace: Low-cost time-synchronized GPIO tracing for IoT testbeds
|
Harms, Laura |
|
|
228 |
C |
p. |
artikel |
15 |
Green NOMA based MU-MIMO transmission for MEC in 6G Networks
|
Dursun, Yunus |
|
|
228 |
C |
p. |
artikel |
16 |
Multi-domain authorization and decision-making method of access control in the edge environment
|
Sun, Yongxia |
|
|
228 |
C |
p. |
artikel |
17 |
On performance of RIS-aided ground-to-air and air-to-ground communications in multi-user NOMA systems
|
Nguyen, Ba Cao |
|
|
228 |
C |
p. |
artikel |
18 |
Optimal algorithm for min-max line barrier coverage with mobile sensors on 2-dimensional plane
|
Yao, Pei |
|
|
228 |
C |
p. |
artikel |
19 |
Performance assessment of a communication infrastructure with redundant topology: A complex network approach
|
Herrera, Manuel |
|
|
228 |
C |
p. |
artikel |
20 |
Real-time bot infection detection system using DNS fingerprinting and machine-learning
|
Quezada, Vicente |
|
|
228 |
C |
p. |
artikel |
21 |
Scalable and fault-tolerant selection method of verification and accounting nodes for permissionless blockchain
|
Zhang, Qian |
|
|
228 |
C |
p. |
artikel |
22 |
The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks
|
Fei, Teng |
|
|
228 |
C |
p. |
artikel |
23 |
Topology construction and topology adjustment in flying Ad hoc networks for relay transmission
|
Liu, Yaqun |
|
|
228 |
C |
p. |
artikel |
24 |
Traffic-aware efficient consistency update in NFV-enabled software defined networking
|
Li, Pan |
|
|
228 |
C |
p. |
artikel |
25 |
Zero-relabelling mobile-app identification over drifted encrypted network traffic
|
Jiang, Minghao |
|
|
228 |
C |
p. |
artikel |