nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A survey on the placement of virtual network functions
|
Sun, Jie |
|
|
202 |
C |
p. |
artikel |
2 |
A two-stage scheduler based on New Caledonian Crow Learning Algorithm and reinforcement learning strategy for cloud environment
|
Mohammad Hasani Zade, B. |
|
|
202 |
C |
p. |
artikel |
3 |
Computation offloading in mobile edge computing networks: A survey
|
Feng, Chuan |
|
|
202 |
C |
p. |
artikel |
4 |
Context-oriented performance evaluation of network selection algorithms in 5G heterogeneous networks
|
Honarvar, Reza |
|
|
202 |
C |
p. |
artikel |
5 |
DIMY: Enabling privacy-preserving contact tracing
|
Ahmed, Nadeem |
|
|
202 |
C |
p. |
artikel |
6 |
Editorial Board
|
|
|
|
202 |
C |
p. |
artikel |
7 |
Efficient stochastic scheduling for highly complex resource placement in edge clouds
|
Wei, Wei |
|
|
202 |
C |
p. |
artikel |
8 |
Enhanced detection of imbalanced malicious network traffic with regularized Generative Adversarial Networks
|
Chapaneri, Radhika |
|
|
202 |
C |
p. |
artikel |
9 |
No more DoS? An empirical study on defense techniques for web server Denial of Service mitigation
|
Catillo, Marta |
|
|
202 |
C |
p. |
artikel |
10 |
SEEDGT: Secure and energy efficient data gathering technique for IoT applications based WSNs
|
Salim, Ahmed |
|
|
202 |
C |
p. |
artikel |
11 |
SmartValidator: A framework for automatic identification and classification of cyber threat data
|
Islam, Chadni |
|
|
202 |
C |
p. |
artikel |