nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs
|
Liu, Xin |
|
|
9 |
5 |
p. 1180-1189 |
artikel |
2 |
Accurate threat hunting in industrial internet of things edge devices
|
Yazdinejad, Abbas |
|
|
9 |
5 |
p. 1123-1130 |
artikel |
3 |
A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems
|
Alladi, Tejasvi |
|
|
9 |
5 |
p. 1113-1122 |
artikel |
4 |
A dynamic and resource sharing virtual network mapping algorithm
|
Xiao, Xiancui |
|
|
9 |
5 |
p. 1101-1112 |
artikel |
5 |
A malware propagation prediction model based on representation learning and graph convolutional networks
|
Li, Tun |
|
|
9 |
5 |
p. 1090-1100 |
artikel |
6 |
A measurable refinement method of design and verification for micro-kernel operating systems in communication network
|
Qian, Zhenjiang |
|
|
9 |
5 |
p. 1070-1079 |
artikel |
7 |
Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective
|
Naeem, Muhammad Ali |
|
|
9 |
5 |
p. 1033-1052 |
artikel |
8 |
Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection
|
Xu, Guangquan |
|
|
9 |
5 |
p. 1169-1179 |
artikel |
9 |
Editorial Board
|
|
|
|
9 |
5 |
p. ii-iii |
artikel |
10 |
Entropy-based redundancy analysis and information screening
|
Li, Yang |
|
|
9 |
5 |
p. 1061-1069 |
artikel |
11 |
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches
|
Kanwal, Tehsin |
|
|
9 |
5 |
p. 1131-1140 |
artikel |
12 |
Green resource allocation for mobile edge computing
|
Meng, Anqi |
|
|
9 |
5 |
p. 1190-1199 |
artikel |
13 |
Multiplex network infomax: Multiplex network embedding via information fusion
|
Wang, Qiang |
|
|
9 |
5 |
p. 1157-1168 |
artikel |
14 |
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems
|
Wang, Yilei |
|
|
9 |
5 |
p. 1053-1060 |
artikel |
15 |
On fine-grained visual explanation in convolutional neural networks
|
Lei, Xia |
|
|
9 |
5 |
p. 1141-1147 |
artikel |
16 |
On the design of an AI-driven secure communication scheme for internet of medical things environment
|
Garg, Neha |
|
|
9 |
5 |
p. 1080-1089 |
artikel |
17 |
Optimal social welfare: A many-to-many data transaction mechanism based on double auctions
|
Duan, Jingyuan |
|
|
9 |
5 |
p. 1230-1241 |
artikel |
18 |
Parity-check and G-matrix based intelligent early stopping criterion for belief propagation decoder for polar codes
|
Jan, Qasim |
|
|
9 |
5 |
p. 1148-1156 |
artikel |
19 |
Request pattern change-based cache pollution attack detection and defense in edge computing
|
Wang, Junwei |
|
|
9 |
5 |
p. 1212-1220 |
artikel |
20 |
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting
|
Zhang, Weishan |
|
|
9 |
5 |
p. 1221-1229 |
artikel |
21 |
Stochastic programming based multi-arm bandit offloading strategy for internet of things
|
Cao, Bin |
|
|
9 |
5 |
p. 1200-1211 |
artikel |