nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A federated approach to Android malware classification through Perm-Maps
|
D’Angelo, Gianni |
|
|
25 |
4 |
p. 2487-2500 |
artikel |
2 |
Analysis of NVMe over fabrics with SCinet DTN-as-a-Service
|
Yu, Se-young |
|
|
25 |
4 |
p. 2991-3003 |
artikel |
3 |
An efficient malware detection approach with feature weighting based on Harris Hawks optimization
|
Alzubi, Omar A. |
|
|
25 |
4 |
p. 2369-2387 |
artikel |
4 |
An explainable and efficient deep learning framework for video anomaly detection
|
Wu, Chongke |
|
|
25 |
4 |
p. 2715-2737 |
artikel |
5 |
An optimized human resource management model for cloud-edge computing in the internet of things
|
Liu, Yishu |
|
|
25 |
4 |
p. 2527-2539 |
artikel |
6 |
Applying neural networks to predict HPC-I/O bandwidth over seismic data on lustre file system for ExSeisDat
|
Tipu, Abdul Jabbar Saeed |
|
|
25 |
4 |
p. 2661-2682 |
artikel |
7 |
A secure authentication technique for connecting different IoT devices in the smart city infrastructure
|
Sharma, Rohit |
|
|
25 |
4 |
p. 2333-2349 |
artikel |
8 |
A survey on internet of energy security: related fields, challenges, threats and emerging technologies
|
Mogadem, Mazin Mohammed |
|
|
25 |
4 |
p. 2449-2485 |
artikel |
9 |
Blockchain-based federated learning methodologies in smart environments
|
Li, Dong |
|
|
25 |
4 |
p. 2585-2599 |
artikel |
10 |
Cloud to cloud data migration using self sovereign identity for 5G and beyond
|
Aruna, M. G. |
|
|
25 |
4 |
p. 2317-2331 |
artikel |
11 |
Cluster mechanism for sensing data report using robust collaborative distributed spectrum sensing
|
Mokhtar, Rania A. |
|
|
25 |
4 |
p. 2541-2556 |
artikel |
12 |
Cluster optimization algorithm based on CPU and GPU hybrid architecture
|
Yin, Fei |
|
|
25 |
4 |
p. 2601-2611 |
artikel |
13 |
Constructing software countermeasures against instruction manipulation attacks: an approach based on vulnerability evaluation using fault simulator
|
Sakamoto, Junichi |
|
|
25 |
4 |
p. 2739-2753 |
artikel |
14 |
Correction to: A secure authentication technique for connecting different IoT devices in the smart city infrastructure
|
Sharma, Rohit |
|
|
25 |
4 |
p. 3035 |
artikel |
15 |
CTSLoc: an indoor localization method based on CNN by using time-series RSSI
|
Liu, Jingbin |
|
|
25 |
4 |
p. 2573-2584 |
artikel |
16 |
DDD: Distributed Dataset DNS
|
White-Swift, Joseph |
|
|
25 |
4 |
p. 2855-2872 |
artikel |
17 |
Detection and classification of sensor anomalies for simulating urban traffic scenarios
|
Bachechi, Chiara |
|
|
25 |
4 |
p. 2793-2817 |
artikel |
18 |
Efficient privacy-preserving anonymous authentication scheme for human predictive online education system
|
Jegadeesan, Subramani |
|
|
25 |
4 |
p. 2557-2571 |
artikel |
19 |
Efficient user-channel pairing with power-domain sum-rate maximization in opportunistic hybrid OFDMA-NOMA IoT systems
|
Abdel-Razeq, Sharief |
|
|
25 |
4 |
p. 2501-2514 |
artikel |
20 |
Fair sharing of network resources among workflow ensembles
|
Papadimitriou, George |
|
|
25 |
4 |
p. 2873-2891 |
artikel |
21 |
High-performance reliable network-multicast over a trial deployment
|
Tan, Yuanlong |
|
|
25 |
4 |
p. 2931-2952 |
artikel |
22 |
IMB-ASYNC: a revised method and benchmark to estimate MPI-3 asynchronous progress efficiency
|
Medvedev, Alexey V. |
|
|
25 |
4 |
p. 2683-2697 |
artikel |
23 |
Improving load balancing for data-duplication in big data cloud computing networks
|
Javadpour, Amir |
|
|
25 |
4 |
p. 2613-2631 |
artikel |
24 |
Intelligent ubiquitous computing for future UAV-enabled MEC network systems
|
Chen, Lunyuan |
|
|
25 |
4 |
p. 2417-2427 |
artikel |
25 |
Joint mode selection and user association in D2D enabled multitier C-RAN
|
Ahmad, Tahir |
|
|
25 |
4 |
p. 2403-2415 |
artikel |
26 |
Joint wireless power transfer and task offloading in mobile edge computing: a survey
|
Mustafa, Ehzaz |
|
|
25 |
4 |
p. 2429-2448 |
artikel |
27 |
Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT
|
Tang, Yongli |
|
|
25 |
4 |
p. 2305-2316 |
artikel |
28 |
Measuring performances and footprint of blockchains with BCTMark: a case study on Ethereum smart contracts energy consumption
|
Saingre, Dimitri |
|
|
25 |
4 |
p. 2819-2837 |
artikel |
29 |
Multi-domain network infrastructure based on P4 programmable devices for Digital Data Marketplaces
|
Shakeri, Sara |
|
|
25 |
4 |
p. 2953-2966 |
artikel |
30 |
Netostat: analyzing dynamic flow patterns in high-speed networks
|
Murugesan, Sugeerth |
|
|
25 |
4 |
p. 2915-2930 |
artikel |
31 |
Offloading strategy with PSO for mobile edge computing based on cache mechanism
|
Zhou, Wenqi |
|
|
25 |
4 |
p. 2389-2401 |
artikel |
32 |
On an improved clustering algorithm based on node density for WSN routing protocol
|
Chang, Luyao |
|
|
25 |
4 |
p. 3005-3017 |
artikel |
33 |
Practical and configurable network traffic classification using probabilistic machine learning
|
Chen, Jiahui |
|
|
25 |
4 |
p. 2839-2853 |
artikel |
34 |
Privacy preserving personalized blockchain reliability prediction via federated learning in IoT environments
|
Xu, Jianlong |
|
|
25 |
4 |
p. 2515-2526 |
artikel |
35 |
SDN-based bandwidth scheduling for prioritized data transfer between data centers
|
Hou, Aiqin |
|
|
25 |
4 |
p. 3019-3034 |
artikel |
36 |
SDN–IoT empowered intelligent framework for industry 4.0 applications during COVID-19 pandemic
|
Rahman, Anichur |
|
|
25 |
4 |
p. 2351-2368 |
artikel |
37 |
Security framework for smart cyber infrastructure
|
Satam, Shalaka |
|
|
25 |
4 |
p. 2767-2778 |
artikel |
38 |
Simulating multi-agent-based computation offloading for autonomous cars
|
Ouarnoughi, Hamza |
|
|
25 |
4 |
p. 2755-2766 |
artikel |
39 |
Software enhancement effort estimation using correlation-based feature selection and stacking ensemble method
|
Sakhrawi, Zaineb |
|
|
25 |
4 |
p. 2779-2792 |
artikel |
40 |
Spark-ITGO: a parallel invasive tumor growth optimization algorithm on spark
|
Lin, Jiaqin |
|
|
25 |
4 |
p. 2633-2660 |
artikel |
41 |
The NetSage measurement and analysis framework in practice
|
Schopf, Jennifer M. |
|
|
25 |
4 |
p. 2967-2990 |
artikel |
42 |
Two-stage selection of distributed data centers based on deep reinforcement learning
|
Li, Qirui |
|
|
25 |
4 |
p. 2699-2714 |
artikel |
43 |
Using advanced data structures to enable responsive security monitoring
|
Vorobyeva, Janet |
|
|
25 |
4 |
p. 2893-2914 |
artikel |