nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A dynamic trust evaluation scheme based on cross-domain trust inheritance for VANETs
|
Ren, Yilong |
|
|
175 |
C |
p. |
artikel |
2 |
An adaptive trust threshold based on Q-Learning for detecting intelligent attacks in vehicular Ad-Hoc Networks
|
Liu, Xiao |
|
|
175 |
C |
p. |
artikel |
3 |
An improved algorithm for indoor localization fingerprint database construction
|
Li, Zhuo |
|
|
175 |
C |
p. |
artikel |
4 |
An integrated routing and data fragmentation strategy for optimizing end-to-end delay in LEO satellite networks
|
Feng, Zhuotong |
|
|
175 |
C |
p. |
artikel |
5 |
Are D2D and RIS in the same league? Cooperative RSSI-based localization model and performance comparison
|
Chukhno, Nadezhda |
|
|
175 |
C |
p. |
artikel |
6 |
A systematic literature review on spectrum detection for Cognitive Radio-Internet of Things networks
|
Lahrouni, Khadija |
|
|
175 |
C |
p. |
artikel |
7 |
ATPSO: Adaptive Task Priority Scheduling and Offloading Optimization Scheme for vehicles in harsh environments
|
Li, Xiguang |
|
|
175 |
C |
p. |
artikel |
8 |
Design and analysis of a LoRa-based system with scheduled transmissions from IoT nodes to UAV in rural areas
|
Andreadis, Alessandro |
|
|
175 |
C |
p. |
artikel |
9 |
Double DQN-based Efficient Quality of Service Routing protocol in Internet of Underwater Things with mobile nodes
|
Zhang, Meiyan |
|
|
175 |
C |
p. |
artikel |
10 |
Editorial Board
|
|
|
|
175 |
C |
p. |
artikel |
11 |
Enhancing user verification and data security scheme for fog computing using self sovereign identification
|
Umoren, Otuekong |
|
|
175 |
C |
p. |
artikel |
12 |
Gauss-AUKF based UWB/IMU fusion localization approach
|
Wei, Mingsheng |
|
|
175 |
C |
p. |
artikel |
13 |
Interval type 2 fuzzy unequal clustering and sleep scheduling for IoT-based WSNs
|
Zaier, Aida |
|
|
175 |
C |
p. |
artikel |
14 |
Joint power minimization and trajectory design for collaborative communication, sensing, and computing in UAV networks
|
Wang, Zhongyu |
|
|
175 |
C |
p. |
artikel |
15 |
KAIM: A distributed K-anonymity selection mechanism based on dual incentives
|
Hu, Zhaowei |
|
|
175 |
C |
p. |
artikel |
16 |
MeshChain: A comprehensive blockchain-based framework for mesh networks
|
Abualola, Huda |
|
|
175 |
C |
p. |
artikel |
17 |
Meta-enhanced hierarchical multi-agent reinforcement learning for dynamic spectrum management and trust-based routing in cognitive vehicular networks
|
Nahar, Ankur |
|
|
175 |
C |
p. |
artikel |
18 |
SC-MLIDS: Fusion-based Machine Learning Framework for Intrusion Detection in Wireless Sensor Networks
|
Zhang, Hongwei |
|
|
175 |
C |
p. |
artikel |
19 |
Securing cell scheduling function in TSCH-based industrial IoT networks
|
Tapadar, Karnish N.A. |
|
|
175 |
C |
p. |
artikel |
20 |
Self-organized task offloading and resource allocation in cognitive air-ground collaborative edge computing networks
|
Sun, Weihao |
|
|
175 |
C |
p. |
artikel |