nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
AI for AI-based intrusion detection as a service: Reinforcement learning to configure models, tasks, and capacities
|
Lin, Ying-Dar |
|
|
229 |
C |
p. |
artikel |
2 |
A multi-UAV assisted task offloading and path optimization for mobile edge computing via multi-agent deep reinforcement learning
|
Ju, Tao |
|
|
229 |
C |
p. |
artikel |
3 |
A robust PID and RLS controller for TCP/AQM system
|
Tang, Junyong |
|
|
229 |
C |
p. |
artikel |
4 |
Caching or not: An online cost optimization algorithm for geodistributed data analysis in cloud environments
|
Yang, Weitao |
|
|
229 |
C |
p. |
artikel |
5 |
CDT: Cross-interface Data Transfer scheme for bandwidth-efficient LoRa communications in energy harvesting multi-hop wireless networks
|
Qin, Hua |
|
|
229 |
C |
p. |
artikel |
6 |
Editorial Board
|
|
|
|
229 |
C |
p. |
artikel |
7 |
Enhancing honeynet-based protection with network slicing for massive Pre-6G IoT Smart Cities deployments
|
Escolar, Antonio Matencio |
|
|
229 |
C |
p. |
artikel |
8 |
Federated deep reinforcement learning for task offloading and resource allocation in mobile edge computing-assisted vehicular networks
|
Zhao, Xu |
|
|
229 |
C |
p. |
artikel |
9 |
Formal dependability analysis of fault tolerant Virtual Machine allocation strategies in Cloud Radio Access Network
|
Younes, Sana |
|
|
229 |
C |
p. |
artikel |
10 |
Green grant-free power allocation for ultra-dense Internet of Things: A mean-field perspective
|
Nadif, Sami |
|
|
229 |
C |
p. |
artikel |
11 |
GROM: A generalized routing optimization method with graph neural network and deep reinforcement learning
|
Ding, Mingjie |
|
|
229 |
C |
p. |
artikel |
12 |
Hybrid kitchen safety guarding with stove fire recognition based on the Internet of Things
|
Chen, Lien-Wu |
|
|
229 |
C |
p. |
artikel |
13 |
MCTE-RPL: A multi-context trust-based efficient RPL for IoT
|
Mohajerani, Javad |
|
|
229 |
C |
p. |
artikel |
14 |
Quick service during DDoS attacks in the container-based cloud environment
|
Kumar, Anmol |
|
|
229 |
C |
p. |
artikel |
15 |
Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things
|
Manivannan, D. |
|
|
229 |
C |
p. |
artikel |
16 |
Seraph: Towards secure and efficient multi-controller authentication with ( t , n ) -threshold signature in multi-domain SDWAN
|
Feng, Wendi |
|
|
229 |
C |
p. |
artikel |
17 |
Synchronizing real-time and high-precision LDoS defense of learning model-based in AIoT with programmable data plane, SDN
|
Ma, Jie |
|
|
229 |
C |
p. |
artikel |
18 |
Synthetic and privacy-preserving traffic trace generation using generative AI models for training Network Intrusion Detection Systems
|
Aceto, Giuseppe |
|
|
229 |
C |
p. |
artikel |
19 |
The universal federator: A third-party authentication solution to federated cloud, edge, and fog
|
Ali, Asad |
|
|
229 |
C |
p. |
artikel |
20 |
Troubleshooting solution for traffic congestion control
|
Tong, Van |
|
|
229 |
C |
p. |
artikel |