Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             21 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs Liu, Xin

9 5 p. 1180-1189
artikel
2 Accurate threat hunting in industrial internet of things edge devices Yazdinejad, Abbas

9 5 p. 1123-1130
artikel
3 A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems Alladi, Tejasvi

9 5 p. 1113-1122
artikel
4 A dynamic and resource sharing virtual network mapping algorithm Xiao, Xiancui

9 5 p. 1101-1112
artikel
5 A malware propagation prediction model based on representation learning and graph convolutional networks Li, Tun

9 5 p. 1090-1100
artikel
6 A measurable refinement method of design and verification for micro-kernel operating systems in communication network Qian, Zhenjiang

9 5 p. 1070-1079
artikel
7 Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective Naeem, Muhammad Ali

9 5 p. 1033-1052
artikel
8 Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection Xu, Guangquan

9 5 p. 1169-1179
artikel
9 Editorial Board
9 5 p. ii-iii
artikel
10 Entropy-based redundancy analysis and information screening Li, Yang

9 5 p. 1061-1069
artikel
11 Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches Kanwal, Tehsin

9 5 p. 1131-1140
artikel
12 Green resource allocation for mobile edge computing Meng, Anqi

9 5 p. 1190-1199
artikel
13 Multiplex network infomax: Multiplex network embedding via information fusion Wang, Qiang

9 5 p. 1157-1168
artikel
14 On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems Wang, Yilei

9 5 p. 1053-1060
artikel
15 On fine-grained visual explanation in convolutional neural networks Lei, Xia

9 5 p. 1141-1147
artikel
16 On the design of an AI-driven secure communication scheme for internet of medical things environment Garg, Neha

9 5 p. 1080-1089
artikel
17 Optimal social welfare: A many-to-many data transaction mechanism based on double auctions Duan, Jingyuan

9 5 p. 1230-1241
artikel
18 Parity-check and G-matrix based intelligent early stopping criterion for belief propagation decoder for polar codes Jan, Qasim

9 5 p. 1148-1156
artikel
19 Request pattern change-based cache pollution attack detection and defense in edge computing Wang, Junwei

9 5 p. 1212-1220
artikel
20 Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting Zhang, Weishan

9 5 p. 1221-1229
artikel
21 Stochastic programming based multi-arm bandit offloading strategy for internet of things Cao, Bin

9 5 p. 1200-1211
artikel
                             21 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland