Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             25 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A dual auditing protocol for fine-grained access control in the edge-cloud-based smart home Zhang, XiaoXu

228 C p.
artikel
2 A novel abstraction for security configuration in virtual networks Bringhenti, Daniele

228 C p.
artikel
3 An overview of analysis methods and evaluation results for caching strategies Hasslinger, Gerhard

228 C p.
artikel
4 CAIN: An energy-aware and intelligent increasing coverage area routing protocol for future 6G networks Marinho, Ricardo Pagoto

228 C p.
artikel
5 Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation Lin, Po-Ching

228 C p.
artikel
6 Coupon Filter: A Universal and Lightweight Filter Framework for More Accurate Data Stream Processing Wu, Xiaocan

228 C p.
artikel
7 Deep reinforcement learning for next-generation IoT networks Garg, Sahil

228 C p.
artikel
8 Delay optimal for reliability-guaranteed concurrent transmissions with raptor code in multi-access 6G edge network Guo, Zhongfu

228 C p.
artikel
9 Dynamic logic-based attack graph for risk assessment in complex computer systems Boudermine, Antoine

228 C p.
artikel
10 Editorial Board
228 C p.
artikel
11 Efficient intrusion detection toward IoT networks using cloud–edge collaboration Yang, Run

228 C p.
artikel
12 Few-shot encrypted traffic classification via multi-task representation enhanced meta-learning Yang, Chen

228 C p.
artikel
13 Going beyond RF: A survey on how AI-enabled multimodal beamforming will shape the NextG standard Roy, Debashri

228 C p.
artikel
14 Grace: Low-cost time-synchronized GPIO tracing for IoT testbeds Harms, Laura

228 C p.
artikel
15 Green NOMA based MU-MIMO transmission for MEC in 6G Networks Dursun, Yunus

228 C p.
artikel
16 Multi-domain authorization and decision-making method of access control in the edge environment Sun, Yongxia

228 C p.
artikel
17 On performance of RIS-aided ground-to-air and air-to-ground communications in multi-user NOMA systems Nguyen, Ba Cao

228 C p.
artikel
18 Optimal algorithm for min-max line barrier coverage with mobile sensors on 2-dimensional plane Yao, Pei

228 C p.
artikel
19 Performance assessment of a communication infrastructure with redundant topology: A complex network approach Herrera, Manuel

228 C p.
artikel
20 Real-time bot infection detection system using DNS fingerprinting and machine-learning Quezada, Vicente

228 C p.
artikel
21 Scalable and fault-tolerant selection method of verification and accounting nodes for permissionless blockchain Zhang, Qian

228 C p.
artikel
22 The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks Fei, Teng

228 C p.
artikel
23 Topology construction and topology adjustment in flying Ad hoc networks for relay transmission Liu, Yaqun

228 C p.
artikel
24 Traffic-aware efficient consistency update in NFV-enabled software defined networking Li, Pan

228 C p.
artikel
25 Zero-relabelling mobile-app identification over drifted encrypted network traffic Jiang, Minghao

228 C p.
artikel
                             25 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland