nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A context-aware zero trust-based hybrid approach to IoT-based self-driving vehicles security
|
Khan, Izhar Ahmed |
|
|
167 |
C |
p. |
artikel |
2 |
A distributed intrusion detection framework for vehicular Ad Hoc networks via federated learning and Blockchain
|
Mansouri, Fedwa |
|
|
167 |
C |
p. |
artikel |
3 |
ADRP-DQL: An adaptive distributed routing protocol for underwater acoustic sensor networks using deep Q-learning
|
M., Adi Surendra Mohanraju |
|
|
167 |
C |
p. |
artikel |
4 |
A general task offloading and resources allocation strategy for multi-RSUs with load unbalance and priority awareness
|
Cao, Dun |
|
|
167 |
C |
p. |
artikel |
5 |
An energy efficient prediction based protocol for target tracking in wireless sensor networks
|
Khiadani, Nadia |
|
|
167 |
C |
p. |
artikel |
6 |
BLE-based sensors for privacy-enabled contagious disease monitoring with zero trust architecture
|
Madan, Akshay |
|
|
167 |
C |
p. |
artikel |
7 |
Cross-layer UAV network routing protocol for spectrum denial environments
|
Zheng, Siyue |
|
|
167 |
C |
p. |
artikel |
8 |
Deep learning with synthetic data for wireless NLOS positioning with a single base station
|
Khachatrian, Hrant |
|
|
167 |
C |
p. |
artikel |
9 |
Editorial Board
|
|
|
|
167 |
C |
p. |
artikel |
10 |
Enhanced reinforcement learning-based two-way transmit-receive directional antennas neighbor discovery in wireless ad hoc networks
|
Wei, Zongheng |
|
|
167 |
C |
p. |
artikel |
11 |
Growth-adaptive distillation compressed fusion model for network traffic identification based on IoT cloud–edge collaboration
|
Yang, Yang |
|
|
167 |
C |
p. |
artikel |
12 |
JamBIT: RL-based framework for disrupting adversarial information in battlefields
|
Salman, Muhammad |
|
|
167 |
C |
p. |
artikel |
13 |
RIS-assisted D2D communication in the presence of interference: Outage performance analysis and DNN-based prediction
|
Amiriara, Hamid |
|
|
167 |
C |
p. |
artikel |
14 |
Transitive reasoning: A high-performance computing model for significant pattern discovery in cognitive IoT sensor network
|
Jha, Vidyapati |
|
|
167 |
C |
p. |
artikel |
15 |
V2X application server and vehicle centric distribution of commitments for V2V message authentication
|
Muhammad, Mujahid |
|
|
167 |
C |
p. |
artikel |
16 |
Wireless sensor networks and machine learning centric resource management schemes: A survey
|
Kori, Gururaj S. |
|
|
167 |
C |
p. |
artikel |