nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cooperative task assignment framework with minimum cooperation cost in crowdsourcing systems
|
Yin, Bo |
|
|
232 |
C |
p. |
artikel |
2 |
A hybrid Bi-level management framework for caching and communication in Edge-AI enabled IoT
|
Sharif, Samane |
|
|
232 |
C |
p. |
artikel |
3 |
An AKA protocol for 5G-assisted D2D communication in Out-of-Coverage scenario
|
Borgohain, Ponjit |
|
|
232 |
C |
p. |
artikel |
4 |
An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks
|
Wang, Cong |
|
|
232 |
C |
p. |
artikel |
5 |
An expandable and cost-effective data center network
|
Lv, Mengjie |
|
|
232 |
C |
p. |
artikel |
6 |
An online cost optimization approach for edge resource provisioning in cloud gaming
|
Tian, Guoqing |
|
|
232 |
C |
p. |
artikel |
7 |
A survey on Ethereum pseudonymity: Techniques, challenges, and future directions
|
Jamwal, Shivani |
|
|
232 |
C |
p. |
artikel |
8 |
A survey on fuzz testing technologies for industrial control protocols
|
Wei, Xiaoyan |
|
|
232 |
C |
p. |
artikel |
9 |
Clone node detection in static wireless sensor networks: A hybrid approach
|
Numan, Muhammad |
|
|
232 |
C |
p. |
artikel |
10 |
Credit risk prediction for small and micro enterprises based on federated transfer learning frozen network parameters
|
Yang, Xiaolei |
|
|
232 |
C |
p. |
artikel |
11 |
DeCa360: Deadline-aware edge caching for two-tier 360° video streaming
|
Lin, Tao |
|
|
232 |
C |
p. |
artikel |
12 |
Distributed enhanced multi-objective evolutionary algorithm based on decomposition for cluster analysis in wireless sensor network
|
Panwar, Anita |
|
|
232 |
C |
p. |
artikel |
13 |
Distributed Fog computing system for weapon detection and face recognition
|
Martinez, Héctor |
|
|
232 |
C |
p. |
artikel |
14 |
Editorial Board
|
|
|
|
232 |
C |
p. |
artikel |
15 |
Energy efficient multi-user task offloading through active RIS with hybrid TDMA-NOMA transmission
|
Lu, Baoshan |
|
|
232 |
C |
p. |
artikel |
16 |
Evolving techniques in cyber threat hunting: A systematic review
|
Mahboubi, Arash |
|
|
232 |
C |
p. |
artikel |
17 |
Exclusively in-store: Acoustic location authentication for stationary business devices
|
Park, Sungbin |
|
|
232 |
C |
p. |
artikel |
18 |
Generalized hierarchical coded caching
|
Espozo-Espinoza, Juan Eloy |
|
|
232 |
C |
p. |
artikel |
19 |
Living on the edge: A survey of Digital Twin-Assisted Task Offloading in safety-critical environments
|
do Carmo, Pedro R.X. |
|
|
232 |
C |
p. |
artikel |
20 |
Node and relevant data selection in distributed predictive analytics: A query-centric approach
|
Aladwani, Tahani |
|
|
232 |
C |
p. |
artikel |
21 |
Performance enhancement of artificial intelligence: A survey
|
Krichen, Moez |
|
|
232 |
C |
p. |
artikel |
22 |
PHIGrader: Evaluating the effectiveness of Manifest file components in Android malware detection using Multi Criteria Decision Making techniques
|
Sharma, Yash |
|
|
232 |
C |
p. |
artikel |
23 |
Reducing cold start delay in serverless computing using lightweight virtual machines
|
Karamzadeh, Amirmohammad |
|
|
232 |
C |
p. |
artikel |
24 |
Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: A survey
|
Hoang, Van-Tam |
|
|
232 |
C |
p. |
artikel |
25 |
SSBM: A spatially separated boxes-based multi-tab website fingerprinting model
|
Hong, Xueshu |
|
|
232 |
C |
p. |
artikel |
26 |
Striking the perfect balance: Multi-objective optimization for minimizing deployment cost and maximizing coverage with Harmony Search
|
Vu, Quang Truong |
|
|
232 |
C |
p. |
artikel |
27 |
Zebra: A cluster-aware blockchain consensus algorithm
|
Wan, Ji |
|
|
232 |
C |
p. |
artikel |