nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
|
Jiang, Qi |
|
2016 |
76 |
C |
p. 37-48 12 p. |
artikel |
2 |
A survey of smart grid architectures, applications, benefits and standardization
|
Nafi, Nazmus S. |
|
2016 |
76 |
C |
p. 23-36 14 p. |
artikel |
3 |
Editorial board
|
|
|
2016 |
76 |
C |
p. IFC- 1 p. |
artikel |
4 |
High performance traffic classification based on message size sequence and distribution
|
Lu, Chun-Nan |
|
2016 |
76 |
C |
p. 60-74 15 p. |
artikel |
5 |
Khorramshahr: A scalable peer to peer architecture for port warehouse management system
|
Goudarzi, Parisa |
|
2016 |
76 |
C |
p. 49-59 11 p. |
artikel |
6 |
N-FIB: Scalable, memory efficient name-based forwarding
|
Saxena, Divya |
|
2016 |
76 |
C |
p. 101-109 9 p. |
artikel |
7 |
On analyzing user location discovery methods in smart homes: A taxonomy and survey
|
Ahvar, Ehsan |
|
2016 |
76 |
C |
p. 75-86 12 p. |
artikel |
8 |
SocialHide: A generic distributed framework for location privacy protection
|
Hwang, Ren-Hung |
|
2016 |
76 |
C |
p. 87-100 14 p. |
artikel |
9 |
Survey of approaches and features for the identification of HTTP-based botnet traffic
|
Acarali, Dilara |
|
2016 |
76 |
C |
p. 1-15 15 p. |
artikel |
10 |
Traffic matrix prediction and estimation based on deep learning in large-scale IP backbone networks
|
Nie, Laisen |
|
2016 |
76 |
C |
p. 16-22 7 p. |
artikel |