nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A fixed clustering protocol based on random relay strategy for EHWSN
|
Luo, Xianquan |
|
|
9 |
1 |
p. 90-100 |
artikel |
2 |
An analysis of energy consumption and carbon footprints of cryptocurrencies and possible solutions
|
Kohli, Varun |
|
|
9 |
1 |
p. 79-89 |
artikel |
3 |
An ensemble deep learning model for cyber threat hunting in industrial internet of things
|
Yazdinejad, Abbas |
|
|
9 |
1 |
p. 101-110 |
artikel |
4 |
An Ethereum-based solution for energy trading in smart grids
|
Buccafurri, Francesco |
|
|
9 |
1 |
p. 194-202 |
artikel |
5 |
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder
|
Wei, Pengcheng |
|
|
9 |
1 |
p. 14-21 |
artikel |
6 |
Application of meta-learning in cyberspace security: a survey
|
Yang, Aimin |
|
|
9 |
1 |
p. 67-78 |
artikel |
7 |
A renewal theory based performance and configuration framework of the IEEE 802.11ah RAW mechanism
|
Taramit, Hamid |
|
|
9 |
1 |
p. 236-251 |
artikel |
8 |
A WKNN-based approach for NB-IoT sensors localization
|
Gambi, Ennio |
|
|
9 |
1 |
p. 175-182 |
artikel |
9 |
Building an interoperable space for smart agriculture
|
Roussaki, Ioanna |
|
|
9 |
1 |
p. 183-193 |
artikel |
10 |
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities
|
Saleous, Heba |
|
|
9 |
1 |
p. 211-222 |
artikel |
11 |
Edge robotics: are we ready? an experimental evaluation of current vision and future directions
|
Groshev, Milan |
|
|
9 |
1 |
p. 166-174 |
artikel |
12 |
Editorial Board
|
|
|
|
9 |
1 |
p. ii-iii |
artikel |
13 |
FedRec: Trusted rank-based recommender scheme for service provisioning in federated cloud environment
|
Verma, Ashwin |
|
|
9 |
1 |
p. 33-46 |
artikel |
14 |
Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine
|
Lin, Haifeng |
|
|
9 |
1 |
p. 111-124 |
artikel |
15 |
Joint offloading strategy based on quantum particle swarm optimization for MEC-enabled vehicular networks
|
Shu, Wanneng |
|
|
9 |
1 |
p. 56-66 |
artikel |
16 |
Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks
|
Khan, Wali Ullah |
|
|
9 |
1 |
p. 264-269 |
artikel |
17 |
Light gradient boosting machine with optimized hyperparameters for identification of malicious access in IoT network
|
Mishra, Debasmita |
|
|
9 |
1 |
p. 125-137 |
artikel |
18 |
Lightweight privacy-preserving truth discovery for vehicular air quality monitoring
|
Liu, Rui |
|
|
9 |
1 |
p. 280-291 |
artikel |
19 |
MEC-based architecture for interoperable and trustworthy internet of moving things
|
Sanchez-Gomez, Jesus |
|
|
9 |
1 |
p. 270-279 |
artikel |
20 |
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract
|
Ji, Baofeng |
|
|
9 |
1 |
p. 47-55 |
artikel |
21 |
Review on application progress of federated learning model and security hazard protection
|
Yang, Aimin |
|
|
9 |
1 |
p. 146-158 |
artikel |
22 |
Secure vehicular data communication in Named Data Networking
|
Wang, Xiaonan |
|
|
9 |
1 |
p. 203-210 |
artikel |
23 |
Set pair three-way overlapping community discovery algorithm for weighted social internet of things
|
Zhang, Chunying |
|
|
9 |
1 |
p. 3-13 |
artikel |
24 |
Smart object recommendation based on topic learning and joint features in the social internet of things
|
Zhang, Hongfei |
|
|
9 |
1 |
p. 22-32 |
artikel |
25 |
Special issue on machine learning-driven big data and blockchain techniques for communication
|
Mumtaz, Shahid |
|
|
9 |
1 |
p. 1-2 |
artikel |
26 |
Time to forge ahead: The Internet of Things for healthcare
|
Furtado, Denzil |
|
|
9 |
1 |
p. 223-235 |
artikel |
27 |
Towards machine-learning-driven effective mashup recommendations from big data in mobile networks and the Internet-of-Things
|
Xu, Yueshen |
|
|
9 |
1 |
p. 138-145 |
artikel |
28 |
User scheduling and power allocation for downlink multi-cell multi-carrier NOMA systems
|
Adam, Abuzar B.M. |
|
|
9 |
1 |
p. 252-263 |
artikel |
29 |
Visually meaningful image encryption algorithm based on digital signature
|
Huang, Xiaoling |
|
|
9 |
1 |
p. 159-165 |
artikel |