Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             28 results found
no title author magazine year volume issue page(s) type
1 A Contextual Multi-Armed Bandit approach for NDN forwarding Mordjana, Yakoub

230 C p.
article
2 Advanced optimization-based weighted features for ensemble deep learning smart occupancy detection network for road traffic parking Padmavathi, B.

230 C p.
article
3 A lightweight SEL for attack detection in IoT/IIoT networks Abdulkareem, Sulyman Age

230 C p.
article
4 An agnostic and secure interoperability protocol for seamless asset movement Diallo, El-hacen

230 C p.
article
5 Attenuating majority attack class bias using hybrid deep learning based IDS framework Narayan, K.G. Raghavendra

230 C p.
article
6 Blockchain applications in UAV industry: Review, opportunities, and challenges Hawashin, Diana

230 C p.
article
7 Broadcast/multicast delivery integration in B5G/6G environments Landrove, Orlando

230 C p.
article
8 CGSNet: Cross-consistency guiding semi-supervised semantic segmentation network for remote sensing of plateau lake Chen, Guangchen

230 C p.
article
9 CL-AP 2 : A composite learning approach to attack prediction via attack portraying Liu, Yingze

230 C p.
article
10 Constrained routing in multi-partite graph to solve VNF placement and chaining problem Saidi, Mohand Yazid

230 C p.
article
11 Detecting DDoS based on attention mechanism for Software-Defined Networks Yoon, Namkyung

230 C p.
article
12 Dynamic Charging Scheduling and Path Planning Scheme for Multiple MC-enabled On-demand Wireless Rechargeable Sensor Networks Goyal, Riya

230 C p.
article
13 Editorial Board
230 C p.
article
14 Exploiting web content semantic features to detect web robots from weblogs Jagat, Rikhi Ram

230 C p.
article
15 JamholeHunter: On detecting new wormhole attack in Opportunistic Mobile Networks Altaweel, Ala

230 C p.
article
16 Leveraging application permissions and network traffic attributes for Android ransomware detection Jeremiah, Sekione Reward

230 C p.
article
17 Metarouting with automatic tunneling in multilayer networks Mouhoub, Noureddine

230 C p.
article
18 Multi-agent reinforcement learning for privacy-aware distributed CNN in heterogeneous IoT surveillance systems Baccour, Emna

230 C p.
article
19 Multi-UAV aided energy-aware transmissions in mmWave communication network: Action-branching QMIX network Do, Quang Tuan

230 C p.
article
20 On designing a profitable system model to harmonize the tripartite dissension in content delivery applications Yang, Libin

230 C p.
article
21 Parallel path selection mechanism for DDoS attack detection Li, Man

230 C p.
article
22 Privacy-preserving generation and publication of synthetic trajectory microdata: A comprehensive survey Kim, Jong Wook

230 C p.
article
23 RECAR: Robust and efficient collision-avoiding routing for 3D underwater named data networking Li, Yue

230 C p.
article
24 Satellite synergy: Navigating resource allocation and energy efficiency in IoT networks Abdullah, Muhammad

230 C p.
article
25 SDN-based reliable emergency message routing schema using Digital Twins for adjusting beacon transmission in VANET Ali, Zainab H.

230 C p.
article
26 Towards zero-energy: Navigating the future with 6G in Cellular Internet of Things Abbas, Muhammad Tahir

230 C p.
article
27 Uncovering phishing attacks using principles of persuasion analysis Bustio-Martínez, Lázaro

230 C p.
article
28 Virtual reality traffic prioritization for Wi-Fi quality of service improvement using machine learning classification techniques Shaabanzadeh, Seyedeh Soheila

230 C p.
article
                             28 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands