Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             28 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Contextual Multi-Armed Bandit approach for NDN forwarding Mordjana, Yakoub

230 C p.
artikel
2 Advanced optimization-based weighted features for ensemble deep learning smart occupancy detection network for road traffic parking Padmavathi, B.

230 C p.
artikel
3 A lightweight SEL for attack detection in IoT/IIoT networks Abdulkareem, Sulyman Age

230 C p.
artikel
4 An agnostic and secure interoperability protocol for seamless asset movement Diallo, El-hacen

230 C p.
artikel
5 Attenuating majority attack class bias using hybrid deep learning based IDS framework Narayan, K.G. Raghavendra

230 C p.
artikel
6 Blockchain applications in UAV industry: Review, opportunities, and challenges Hawashin, Diana

230 C p.
artikel
7 Broadcast/multicast delivery integration in B5G/6G environments Landrove, Orlando

230 C p.
artikel
8 CGSNet: Cross-consistency guiding semi-supervised semantic segmentation network for remote sensing of plateau lake Chen, Guangchen

230 C p.
artikel
9 CL-AP 2 : A composite learning approach to attack prediction via attack portraying Liu, Yingze

230 C p.
artikel
10 Constrained routing in multi-partite graph to solve VNF placement and chaining problem Saidi, Mohand Yazid

230 C p.
artikel
11 Detecting DDoS based on attention mechanism for Software-Defined Networks Yoon, Namkyung

230 C p.
artikel
12 Dynamic Charging Scheduling and Path Planning Scheme for Multiple MC-enabled On-demand Wireless Rechargeable Sensor Networks Goyal, Riya

230 C p.
artikel
13 Editorial Board
230 C p.
artikel
14 Exploiting web content semantic features to detect web robots from weblogs Jagat, Rikhi Ram

230 C p.
artikel
15 JamholeHunter: On detecting new wormhole attack in Opportunistic Mobile Networks Altaweel, Ala

230 C p.
artikel
16 Leveraging application permissions and network traffic attributes for Android ransomware detection Jeremiah, Sekione Reward

230 C p.
artikel
17 Metarouting with automatic tunneling in multilayer networks Mouhoub, Noureddine

230 C p.
artikel
18 Multi-agent reinforcement learning for privacy-aware distributed CNN in heterogeneous IoT surveillance systems Baccour, Emna

230 C p.
artikel
19 Multi-UAV aided energy-aware transmissions in mmWave communication network: Action-branching QMIX network Do, Quang Tuan

230 C p.
artikel
20 On designing a profitable system model to harmonize the tripartite dissension in content delivery applications Yang, Libin

230 C p.
artikel
21 Parallel path selection mechanism for DDoS attack detection Li, Man

230 C p.
artikel
22 Privacy-preserving generation and publication of synthetic trajectory microdata: A comprehensive survey Kim, Jong Wook

230 C p.
artikel
23 RECAR: Robust and efficient collision-avoiding routing for 3D underwater named data networking Li, Yue

230 C p.
artikel
24 Satellite synergy: Navigating resource allocation and energy efficiency in IoT networks Abdullah, Muhammad

230 C p.
artikel
25 SDN-based reliable emergency message routing schema using Digital Twins for adjusting beacon transmission in VANET Ali, Zainab H.

230 C p.
artikel
26 Towards zero-energy: Navigating the future with 6G in Cellular Internet of Things Abbas, Muhammad Tahir

230 C p.
artikel
27 Uncovering phishing attacks using principles of persuasion analysis Bustio-Martínez, Lázaro

230 C p.
artikel
28 Virtual reality traffic prioritization for Wi-Fi quality of service improvement using machine learning classification techniques Shaabanzadeh, Seyedeh Soheila

230 C p.
artikel
                             28 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland