no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A comprehensive survey and taxonomy of the SVM-based intrusion detection systems
|
Mohammadi, Mokhtar |
|
|
178 |
C |
p. |
article |
2 |
Adopting elitism-based Genetic Algorithm for minimizing multi-objective problems of IoT service placement in fog computing environment
|
Natesha, B.V. |
|
|
178 |
C |
p. |
article |
3 |
An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach
|
Shakarami, Ali |
|
|
178 |
C |
p. |
article |
4 |
A survey on the suitability of risk identification techniques in the current networked environment
|
Aboutorab, Hamed |
|
|
178 |
C |
p. |
article |
5 |
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues
|
Sookhak, Mehdi |
|
|
178 |
C |
p. |
article |
6 |
Editorial Board
|
|
|
|
178 |
C |
p. |
article |
7 |
Energy-efficient scheduling of small cells in 5G: A meta-heuristic approach
|
Shuvo, Md. Shahin Alom |
|
|
178 |
C |
p. |
article |
8 |
LIDDE: A differential evolution algorithm based on local-influence-descending search strategy for influence maximization in social networks
|
Qiu, Liqing |
|
|
178 |
C |
p. |
article |
9 |
Modeling and analyzing RFID Generation-2 under unreliable channels
|
Chen, Yihong |
|
|
178 |
C |
p. |
article |
10 |
Secure and cost-effective controller deployment in multi-domain SDN with Baguette
|
Feng, Wendi |
|
|
178 |
C |
p. |
article |
11 |
Virtual reality: A survey of enabling technologies and its applications in IoT
|
Hu, Miao |
|
|
178 |
C |
p. |
article |