nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Academic social networks: Modeling, analysis, mining and applications
|
Kong, Xiangjie |
|
|
132 |
C |
p. 86-103 |
artikel |
2 |
Adaptive and Beacon-based multi-channel protocol for Industrial Wireless Sensor Networks
|
Gomes, Ruan D. |
|
|
132 |
C |
p. 22-39 |
artikel |
3 |
An SDN-based framework for improving the performance of underprovisioned IP Video Surveillance networks
|
Go, Sharleen Joy Y. |
|
|
132 |
C |
p. 49-74 |
artikel |
4 |
A protocol for detecting missing target tags in RFID systems
|
Han, Wenyuan |
|
|
132 |
C |
p. 40-48 |
artikel |
5 |
Countering passive cyber attacks against sink nodes in tactical sensor networks using reactive route obfuscation
|
Thulasiraman, P. |
|
|
132 |
C |
p. 10-21 |
artikel |
6 |
Editorial Board
|
|
|
|
132 |
C |
p. ii |
artikel |
7 |
Energy management in harvesting enabled sensing nodes: Prediction and control
|
Ashraf, Nouman |
|
|
132 |
C |
p. 104-117 |
artikel |
8 |
Predicting content consumption from content-to-content relationships
|
Han, Jinyoung |
|
|
132 |
C |
p. 1-9 |
artikel |
9 |
RETRACTED: Flow online identification method for the encrypted Skype
|
Dong, Shi |
|
|
132 |
C |
p. 75-85 |
artikel |
10 |
RETRACTED: Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey
|
Gupta, Abhishek |
|
|
132 |
C |
p. 118-148 |
artikel |