Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             20 results found
no title author magazine year volume issue page(s) type
1 AI for AI-based intrusion detection as a service: Reinforcement learning to configure models, tasks, and capacities Lin, Ying-Dar

229 C p.
article
2 A multi-UAV assisted task offloading and path optimization for mobile edge computing via multi-agent deep reinforcement learning Ju, Tao

229 C p.
article
3 A robust PID and RLS controller for TCP/AQM system Tang, Junyong

229 C p.
article
4 Caching or not: An online cost optimization algorithm for geodistributed data analysis in cloud environments Yang, Weitao

229 C p.
article
5 CDT: Cross-interface Data Transfer scheme for bandwidth-efficient LoRa communications in energy harvesting multi-hop wireless networks Qin, Hua

229 C p.
article
6 Editorial Board
229 C p.
article
7 Enhancing honeynet-based protection with network slicing for massive Pre-6G IoT Smart Cities deployments Escolar, Antonio Matencio

229 C p.
article
8 Federated deep reinforcement learning for task offloading and resource allocation in mobile edge computing-assisted vehicular networks Zhao, Xu

229 C p.
article
9 Formal dependability analysis of fault tolerant Virtual Machine allocation strategies in Cloud Radio Access Network Younes, Sana

229 C p.
article
10 Green grant-free power allocation for ultra-dense Internet of Things: A mean-field perspective Nadif, Sami

229 C p.
article
11 GROM: A generalized routing optimization method with graph neural network and deep reinforcement learning Ding, Mingjie

229 C p.
article
12 Hybrid kitchen safety guarding with stove fire recognition based on the Internet of Things Chen, Lien-Wu

229 C p.
article
13 MCTE-RPL: A multi-context trust-based efficient RPL for IoT Mohajerani, Javad

229 C p.
article
14 Quick service during DDoS attacks in the container-based cloud environment Kumar, Anmol

229 C p.
article
15 Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things Manivannan, D.

229 C p.
article
16 Seraph: Towards secure and efficient multi-controller authentication with ( t , n ) -threshold signature in multi-domain SDWAN Feng, Wendi

229 C p.
article
17 Synchronizing real-time and high-precision LDoS defense of learning model-based in AIoT with programmable data plane, SDN Ma, Jie

229 C p.
article
18 Synthetic and privacy-preserving traffic trace generation using generative AI models for training Network Intrusion Detection Systems Aceto, Giuseppe

229 C p.
article
19 The universal federator: A third-party authentication solution to federated cloud, edge, and fog Ali, Asad

229 C p.
article
20 Troubleshooting solution for traffic congestion control Tong, Van

229 C p.
article
                             20 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands