nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A detailed study on trust management techniques for security and privacy in IoT: challenges, trends, and research directions
|
Tyagi, Himani |
|
|
3 |
2 |
p. |
artikel |
2 |
A review on offloading in fog-based Internet of Things: Architecture, machine learning approaches, and open issues
|
Lone, Kalimullah |
|
|
3 |
2 |
p. |
artikel |
3 |
A survey on security analysis of machine learning-oriented hardware and software intellectual property
|
Tauhid, Ashraful |
|
|
3 |
2 |
p. |
artikel |
4 |
Attribute-based keyword search encryption for power data protection
|
Zhang, Xun |
|
|
3 |
2 |
p. |
artikel |
5 |
Data-driven approach to designing a BCI-integrated smart wheelchair through cost–benefit analysis
|
Badajena, Jenamani Chandrakanta |
|
|
3 |
2 |
p. |
artikel |
6 |
Decentralizing access control system for data sharing in smart grid
|
Liu, Kunpeng |
|
|
3 |
2 |
p. |
artikel |
7 |
DPTP-LICD: A differential privacy trajectory protection method based on latent interest community detection
|
Zhang, Weiqi |
|
|
3 |
2 |
p. |
artikel |
8 |
Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM
|
Aiyshwariya Devi, R. |
|
|
3 |
2 |
p. |
artikel |
9 |
Erratum regarding missing statements in previously published articles
|
|
|
|
3 |
2 |
p. |
artikel |
10 |
Lightweight key distribution for secured and energy efficient communication in wireless sensor network: An optimization assisted model
|
P., Ezhil Roja |
|
|
3 |
2 |
p. |
artikel |
11 |
PRAP-PIM: A weight pattern reusing aware pruning method for ReRAM-based PIM DNN accelerators
|
Shen, Zhaoyan |
|
|
3 |
2 |
p. |
artikel |