nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An efficient multi-objective UAV assisted RSU deployment (MOURD) scheme for VANET
|
Jain, Samkit |
|
|
163 |
C |
p. |
artikel |
2 |
A new priority aware routing protocol for efficient emergency data transmissions in MANETs
|
Ozen, Yunus |
|
|
163 |
C |
p. |
artikel |
3 |
An innovative multi-agent approach for robust cyber–physical systems using vertical federated learning
|
Gaba, Shivani |
|
|
163 |
C |
p. |
artikel |
4 |
An online energy-saving offloading algorithm in mobile edge computing with Lyapunov optimization
|
Zhao, Xiaoyan |
|
|
163 |
C |
p. |
artikel |
5 |
Anonymous data sharing scheme for resource-constrained internet of things environments
|
Zhang, Zetian |
|
|
163 |
C |
p. |
artikel |
6 |
A smart contract-based 6G-enabled authentication scheme for securing Internet of Nano Medical Things network
|
Kumar, Neeraj |
|
|
163 |
C |
p. |
artikel |
7 |
BPS-V: A blockchain-based trust model for the Internet of Vehicles with privacy-preserving
|
Wang, Chuanhua |
|
|
163 |
C |
p. |
artikel |
8 |
Cache content placement in the presence of fictitious requests in mmWave 5G IAB networks
|
Hashemi Nazarifard, Fatemeh Sadat |
|
|
163 |
C |
p. |
artikel |
9 |
Comparative study of novel packet loss analysis and recovery capability between hybrid TLI-µTESLA and other variant TESLA protocols
|
Eledlebi, Khouloud |
|
|
163 |
C |
p. |
artikel |
10 |
Context-aware resource allocation for vehicle-to-vehicle communications in cellular-V2X networks
|
Zhang, Fuxin |
|
|
163 |
C |
p. |
artikel |
11 |
DBCPCA:Double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication for VANETs
|
Guo, Xian |
|
|
163 |
C |
p. |
artikel |
12 |
Dynamic spectrum access for Internet-of-Things with joint GNN and DQN
|
Li, Feng |
|
|
163 |
C |
p. |
artikel |
13 |
Editorial Board
|
|
|
|
163 |
C |
p. |
artikel |
14 |
Enabling Ultra Reliable Low Latency Communications in rural areas using UAV swarms
|
García-Gil, Santiago |
|
|
163 |
C |
p. |
artikel |
15 |
Enhancing longevity: Sustainable channel modeling for wireless-powered implantable BANs
|
Chaudhary, Sameeksha |
|
|
163 |
C |
p. |
artikel |
16 |
Evaluating the quality of service of Opportunistic Mobile Ad Hoc Network routing algorithms on real devices: A software-driven approach
|
Jesús-Azabal, Manuel |
|
|
163 |
C |
p. |
artikel |
17 |
Federated Learning assisted framework to periodically identify user communities in urban space
|
de Souza, Cláudio Diego T. |
|
|
163 |
C |
p. |
artikel |
18 |
Hyper-graph matching D2D offloading scheme for enhanced computation and communication capacity
|
Zhao, Pan |
|
|
163 |
C |
p. |
artikel |
19 |
ILLUMINE: Illumination UAVs deployment optimization based on consumer drone
|
Ma, Bo |
|
|
163 |
C |
p. |
artikel |
20 |
Image-based intrusion detection system for GPS spoofing cyberattacks in unmanned aerial vehicles
|
Korium, Mohamed Selim |
|
|
163 |
C |
p. |
artikel |
21 |
Inferring mobile applications usage from DNS traffic
|
Campo, Celeste |
|
|
163 |
C |
p. |
artikel |
22 |
Intelligent Computer Networks and Distributed Systems
|
Kamienski, Carlos |
|
|
163 |
C |
p. |
artikel |
23 |
IoV-BCFL: An intrusion detection method for IoV based on blockchain and federated learning
|
Xie, Nannan |
|
|
163 |
C |
p. |
artikel |
24 |
iTRPL: An intelligent and trusted RPL protocol based on Multi-Agent Reinforcement Learning
|
Dey, Debasmita |
|
|
163 |
C |
p. |
artikel |
25 |
LETM-IoT: A lightweight and efficient trust mechanism for Sybil attacks in Internet of Things networks
|
Hassan, Jawad |
|
|
163 |
C |
p. |
artikel |
26 |
Local search resource allocation algorithm for space-based backbone network in Deep Reinforcement Learning method
|
Zhang, Peiying |
|
|
163 |
C |
p. |
artikel |
27 |
Machine learning attack detection based-on stochastic classifier methods for enhancing of routing security in wireless sensor networks
|
Affane M., Anselme R. |
|
|
163 |
C |
p. |
artikel |
28 |
Multi-attribute weighted convolutional attention neural network for multiuser physical layer authentication in IIoT
|
Wu, Yue |
|
|
163 |
C |
p. |
artikel |
29 |
Multivariate and multistep mobile traffic prediction with SLA constraints: A comparative study
|
Tuna, Evren |
|
|
163 |
C |
p. |
artikel |
30 |
Partitioned uneven cluster routing algorithm based on gray wolf optimization in WSNs
|
Zhou, Yizhuo |
|
|
163 |
C |
p. |
artikel |
31 |
Protect your data and I’ll rank its utility: A framework for utility analysis of anonymized mobility data for smart city applications
|
Mattos, Ekler Paulino de |
|
|
163 |
C |
p. |
artikel |
32 |
Resource and trajectory optimization for UAV-assisted MEC communication systems over unlicensed spectrum band
|
Pei, Errong |
|
|
163 |
C |
p. |
artikel |
33 |
SoftWind: Software-defined trajectory correction modelling of gust wind effects on internet of drone things using glowworm swarm optimization
|
Hazra, Arnab |
|
|
163 |
C |
p. |
artikel |
34 |
Status update scheduling in remote sensing under variable activation and propagation delays
|
Badia, Leonardo |
|
|
163 |
C |
p. |
artikel |
35 |
Strategic deployment of RSUs in urban settings: Optimizing IEEE 802.11p infrastructure
|
Astudillo León, Juan Pablo |
|
|
163 |
C |
p. |
artikel |
36 |
Whale optimization-orchestrated Federated Learning-based resource allocation scheme for D2D communication
|
Jadav, Nilesh Kumar |
|
|
163 |
C |
p. |
artikel |