nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Contextual Multi-Armed Bandit approach for NDN forwarding
|
Mordjana, Yakoub |
|
|
230 |
C |
p. |
artikel |
2 |
Advanced optimization-based weighted features for ensemble deep learning smart occupancy detection network for road traffic parking
|
Padmavathi, B. |
|
|
230 |
C |
p. |
artikel |
3 |
A lightweight SEL for attack detection in IoT/IIoT networks
|
Abdulkareem, Sulyman Age |
|
|
230 |
C |
p. |
artikel |
4 |
An agnostic and secure interoperability protocol for seamless asset movement
|
Diallo, El-hacen |
|
|
230 |
C |
p. |
artikel |
5 |
Attenuating majority attack class bias using hybrid deep learning based IDS framework
|
Narayan, K.G. Raghavendra |
|
|
230 |
C |
p. |
artikel |
6 |
Blockchain applications in UAV industry: Review, opportunities, and challenges
|
Hawashin, Diana |
|
|
230 |
C |
p. |
artikel |
7 |
Broadcast/multicast delivery integration in B5G/6G environments
|
Landrove, Orlando |
|
|
230 |
C |
p. |
artikel |
8 |
CGSNet: Cross-consistency guiding semi-supervised semantic segmentation network for remote sensing of plateau lake
|
Chen, Guangchen |
|
|
230 |
C |
p. |
artikel |
9 |
CL-AP 2 : A composite learning approach to attack prediction via attack portraying
|
Liu, Yingze |
|
|
230 |
C |
p. |
artikel |
10 |
Constrained routing in multi-partite graph to solve VNF placement and chaining problem
|
Saidi, Mohand Yazid |
|
|
230 |
C |
p. |
artikel |
11 |
Detecting DDoS based on attention mechanism for Software-Defined Networks
|
Yoon, Namkyung |
|
|
230 |
C |
p. |
artikel |
12 |
Dynamic Charging Scheduling and Path Planning Scheme for Multiple MC-enabled On-demand Wireless Rechargeable Sensor Networks
|
Goyal, Riya |
|
|
230 |
C |
p. |
artikel |
13 |
Editorial Board
|
|
|
|
230 |
C |
p. |
artikel |
14 |
Exploiting web content semantic features to detect web robots from weblogs
|
Jagat, Rikhi Ram |
|
|
230 |
C |
p. |
artikel |
15 |
JamholeHunter: On detecting new wormhole attack in Opportunistic Mobile Networks
|
Altaweel, Ala |
|
|
230 |
C |
p. |
artikel |
16 |
Leveraging application permissions and network traffic attributes for Android ransomware detection
|
Jeremiah, Sekione Reward |
|
|
230 |
C |
p. |
artikel |
17 |
Metarouting with automatic tunneling in multilayer networks
|
Mouhoub, Noureddine |
|
|
230 |
C |
p. |
artikel |
18 |
Multi-agent reinforcement learning for privacy-aware distributed CNN in heterogeneous IoT surveillance systems
|
Baccour, Emna |
|
|
230 |
C |
p. |
artikel |
19 |
Multi-UAV aided energy-aware transmissions in mmWave communication network: Action-branching QMIX network
|
Do, Quang Tuan |
|
|
230 |
C |
p. |
artikel |
20 |
On designing a profitable system model to harmonize the tripartite dissension in content delivery applications
|
Yang, Libin |
|
|
230 |
C |
p. |
artikel |
21 |
Parallel path selection mechanism for DDoS attack detection
|
Li, Man |
|
|
230 |
C |
p. |
artikel |
22 |
Privacy-preserving generation and publication of synthetic trajectory microdata: A comprehensive survey
|
Kim, Jong Wook |
|
|
230 |
C |
p. |
artikel |
23 |
RECAR: Robust and efficient collision-avoiding routing for 3D underwater named data networking
|
Li, Yue |
|
|
230 |
C |
p. |
artikel |
24 |
Satellite synergy: Navigating resource allocation and energy efficiency in IoT networks
|
Abdullah, Muhammad |
|
|
230 |
C |
p. |
artikel |
25 |
SDN-based reliable emergency message routing schema using Digital Twins for adjusting beacon transmission in VANET
|
Ali, Zainab H. |
|
|
230 |
C |
p. |
artikel |
26 |
Towards zero-energy: Navigating the future with 6G in Cellular Internet of Things
|
Abbas, Muhammad Tahir |
|
|
230 |
C |
p. |
artikel |
27 |
Uncovering phishing attacks using principles of persuasion analysis
|
Bustio-Martínez, Lázaro |
|
|
230 |
C |
p. |
artikel |
28 |
Virtual reality traffic prioritization for Wi-Fi quality of service improvement using machine learning classification techniques
|
Shaabanzadeh, Seyedeh Soheila |
|
|
230 |
C |
p. |
artikel |