nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling
|
Shahid, Waleed Bin |
|
|
198 |
C |
p. |
artikel |
2 |
A robust authentication scheme for remote diagnosis and maintenance in 5G V2N
|
Ma, Ruhui |
|
|
198 |
C |
p. |
artikel |
3 |
A survey on energy efficiency in underwater wireless communications
|
Islam, Kazi Yasin |
|
|
198 |
C |
p. |
artikel |
4 |
Blockchain-based delegated Quantum Cloud architecture for medical big data security
|
EL Azzaoui, Abir |
|
|
198 |
C |
p. |
artikel |
5 |
Design and implementation of an intrusion detection system by using Extended BPF in the Linux kernel
|
Wang, Shie-Yuan |
|
|
198 |
C |
p. |
artikel |
6 |
Editorial Board
|
|
|
|
198 |
C |
p. |
artikel |
7 |
On the scalability of Big Data Cyber Security Analytics systems
|
Ullah, Faheem |
|
|
198 |
C |
p. |
artikel |
8 |
RANet: Network intrusion detection with group-gating convolutional neural network
|
Zhang, Xiaoqing |
|
|
198 |
C |
p. |
artikel |
9 |
Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey
|
Benhamaid, Sana |
|
|
198 |
C |
p. |
artikel |
10 |
Smart network maintenance in edge cloud computing environment: An allocation mechanism based on comprehensive reputation and regional prediction model
|
Rui, Lanlan |
|
|
198 |
C |
p. |
artikel |