nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A fast coordination approach for large-scale drone swarm
|
Chen, Wu |
|
|
221 |
C |
p. |
artikel |
2 |
A hybrid analytical concept to QoE index evaluation: Enhancing eMBB service detection in 5G SA networks
|
Dahj, Jean Nestor M. |
|
|
221 |
C |
p. |
artikel |
3 |
An enhanced node segmentation and distance estimation scheme with a reduced search space boundary and improved PSO for obstacle-aware wireless sensor network localization
|
Phoemphon, Songyut |
|
|
221 |
C |
p. |
artikel |
4 |
CE-VNE: Constraint escalation virtual network embedding algorithm assisted by graph convolutional networks
|
Zhang, Peiying |
|
|
221 |
C |
p. |
artikel |
5 |
Comprehensive review on congestion detection, alleviation, and control for IoT networks
|
P., Anitha |
|
|
221 |
C |
p. |
artikel |
6 |
DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm
|
Latif, Shahid |
|
|
221 |
C |
p. |
artikel |
7 |
Dynamic resource management in integrated NOMA terrestrial–satellite networks using multi-agent reinforcement learning
|
Nauman, Ali |
|
|
221 |
C |
p. |
artikel |
8 |
Editorial Board
|
|
|
|
221 |
C |
p. |
artikel |
9 |
Enabling containerized Central Unit live migration in 5G radio access network: An experimental study
|
Ramanathan, Shunmugapriya |
|
|
221 |
C |
p. |
artikel |
10 |
End-to-end active queue management with Named-Data Networking
|
Rodríguez-Pérez, Miguel |
|
|
221 |
C |
p. |
artikel |
11 |
Fine-grained access control policy in blockchain-enabled edge computing
|
He, Guangxuan |
|
|
221 |
C |
p. |
artikel |
12 |
HADES: An NFV solution for energy-efficient placement and resource allocation in heterogeneous infrastructures
|
Cañete, Angel |
|
|
221 |
C |
p. |
artikel |
13 |
Multipoint communication using a fog-robotic coordinated nodal conveying system for wireless networks
|
Periyanayagi, S. |
|
|
221 |
C |
p. |
artikel |
14 |
Node cardinality estimation in a heterogeneous wireless network deployed over a large region using a mobile base station
|
Kadam, Sachin |
|
|
221 |
C |
p. |
artikel |
15 |
RAaaS: Resource Allocation as a Service in multiple cloud providers
|
Vieira, Cristiano Costa Argemon |
|
|
221 |
C |
p. |
artikel |
16 |
Region-aware dynamic job scheduling and resource efficiency for load balancing based on adaptive chaotic sparrow search optimization and coalitional game in cloud computing environments
|
Khaleel, Mustafa Ibrahim |
|
|
221 |
C |
p. |
artikel |
17 |
Reviewer Thankyou
|
|
|
|
221 |
C |
p. |
artikel |
18 |
RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things
|
Wang, Ruijin |
|
|
221 |
C |
p. |
artikel |
19 |
Security attacks in Opportunistic Mobile Networks: A systematic literature review
|
Altaweel, Ala |
|
|
221 |
C |
p. |
artikel |
20 |
STOP: Joint send buffer and transmission control for user-perceived deadline guarantee via curriculum guided-deep reinforcement learning
|
Liao, Rongji |
|
|
221 |
C |
p. |
artikel |
21 |
Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction
|
Ashrif, Fatma Foad |
|
|
221 |
C |
p. |
artikel |
22 |
Task offloading to edge cloud balancing utility and cost for energy harvesting Internet of Things
|
Nandi, Pranjal Kumar |
|
|
221 |
C |
p. |
artikel |
23 |
Tracing footprints of anti-forensics and assuring secured data transmission in the cloud using an effective ECCDH and Kalman Filter
|
Sharmila, Shaik |
|
|
221 |
C |
p. |
artikel |
24 |
Trust-minimized optimistic cross-rollup arbitrary message bridge
|
Fekete, Dénes László |
|
|
221 |
C |
p. |
artikel |
25 |
Using deep reinforcement learning to train and periodically re-train a data-collecting drone based on real-life measurements
|
Wang, Shie-Yuan |
|
|
221 |
C |
p. |
artikel |