nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning
|
Yungaicela-Naula, Noe M. |
|
|
205 |
C |
p. |
artikel |
2 |
ALVS: Adaptive Live Video Streaming using deep reinforcement learning
|
Ozcelik, Ihsan Mert |
|
|
205 |
C |
p. |
artikel |
3 |
Cybersecurity strategy under uncertainties for an IoE environment
|
Bokhari, Samira |
|
|
205 |
C |
p. |
artikel |
4 |
Data reconstruction applications for IoT air pollution sensor networks using graph signal processing
|
Ferrer-Cid, Pau |
|
|
205 |
C |
p. |
artikel |
5 |
Deep Reinforcement Learning based reliable spectrum sensing under SSDF attacks in Cognitive Radio networks
|
Paul, Anal |
|
|
205 |
C |
p. |
artikel |
6 |
Diagnosing the coexistence of Poissonity and self-similarity in memory workloads
|
Zou, Qiang |
|
|
205 |
C |
p. |
artikel |
7 |
Editorial Board
|
|
|
|
205 |
C |
p. |
artikel |
8 |
Efficient solutions for target localization in asynchronous MIMO networks
|
Wu, Xiaoping |
|
|
205 |
C |
p. |
artikel |
9 |
FastHand: A fast handover authentication protocol for densely deployed small-cell networks
|
Roy, Prasanta Kumar |
|
|
205 |
C |
p. |
artikel |
10 |
Holistic resource management in UAV-assisted wireless networks: An optimization perspective
|
Taimoor, Shamim |
|
|
205 |
C |
p. |
artikel |
11 |
Interest forwarding strategy in Named Data Networks (NDN) using Thompson Sampling
|
Akther, Nazma |
|
|
205 |
C |
p. |
artikel |
12 |
Locality-based transfer learning on compression autoencoder for efficient scientific data lossy compression
|
Wang, Nan |
|
|
205 |
C |
p. |
artikel |
13 |
Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy
|
Soni, Dinesh |
|
|
205 |
C |
p. |
artikel |
14 |
Multi-level video quality services and security guarantees based on compressive sensing in sensor-cloud system
|
Li, Min |
|
|
205 |
C |
p. |
artikel |
15 |
Network Coding-based Resilient Routing for Maintaining Data Security and Availability in Software-Defined Networks
|
Ni, Haoran |
|
|
205 |
C |
p. |
artikel |
16 |
Node cooperation for workload offloading in a fog computing network via multi-objective optimization
|
Vakilian, Shakoor |
|
|
205 |
C |
p. |
artikel |
17 |
On-device modeling of user’s social context and familiar places from smartphone-embedded sensor data
|
Campana, Mattia G. |
|
|
205 |
C |
p. |
artikel |
18 |
PriFoB: A Privacy-aware Fog-enhanced Blockchain-based system for Global Accreditation and Credential Verification
|
Baniata, Hamza |
|
|
205 |
C |
p. |
artikel |
19 |
Review of Underwater Mobile Sensor Network for ocean phenomena monitoring
|
S., Ansa Shermin |
|
|
205 |
C |
p. |
artikel |
20 |
Split PO for paging in B5G networks
|
Agiwal, Mamta |
|
|
205 |
C |
p. |
artikel |
21 |
Survivable virtual network embedding algorithm considering multiple node failure in IIoT environment
|
Zhang, Peiying |
|
|
205 |
C |
p. |
artikel |
22 |
Utilization aware and network I/O intensive virtual machine placement policies for cloud data center
|
Karmakar, Kamalesh |
|
|
205 |
C |
p. |
artikel |