nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A classification-based sensor data processing method for the internet of things assimilated wearable sensor technology
|
Pradhan, Manas Ranjan |
|
|
26 |
1 |
p. 807-822 |
artikel |
2 |
A feature-based processing framework for real-time implementation of muscle fatigue measurement
|
González-Zamora, P. |
|
|
26 |
1 |
p. 385-394 |
artikel |
3 |
A flow-based intrusion detection framework for internet of things networks
|
Santos, Leonel |
|
|
26 |
1 |
p. 37-57 |
artikel |
4 |
A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks
|
Jeyaselvi, M. |
|
|
26 |
1 |
p. 559-574 |
artikel |
5 |
A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things
|
Sangaiah, Arun Kumar |
|
|
26 |
1 |
p. 599-612 |
artikel |
6 |
An empirical analysis of image augmentation against model inversion attack in federated learning
|
Shin, Seunghyeon |
|
|
26 |
1 |
p. 349-366 |
artikel |
7 |
A new method of content distribution based on fuzzy logic and coalition graph games for VEC
|
Zhang, De-gan |
|
|
26 |
1 |
p. 701-717 |
artikel |
8 |
An intelligent outlier detection with machine learning empowered big data analytics for mobile edge computing
|
Mansour, Romany F. |
|
|
26 |
1 |
p. 71-83 |
artikel |
9 |
A review of smart contract-based platforms, applications, and challenges
|
Sharma, Pratima |
|
|
26 |
1 |
p. 395-421 |
artikel |
10 |
A secure and flexible edge computing scheme for AI-driven industrial IoT
|
Zhao, Yan |
|
|
26 |
1 |
p. 283-301 |
artikel |
11 |
A security evaluation model for multi-source heterogeneous systems based on IOT and edge computing
|
Guo, Ziyu |
|
|
26 |
1 |
p. 303-317 |
artikel |
12 |
A task offloading algorithm for cloud-edge collaborative system based on Lyapunov optimization
|
Gao, Jixun |
|
|
26 |
1 |
p. 337-348 |
artikel |
13 |
Automatic delay-sensitive applications quality of service improvement with deep flows discrimination in software defined networks
|
Mohammadi, Ramin |
|
|
26 |
1 |
p. 437-459 |
artikel |
14 |
Blockchain-based incentive management framework for desktop clouds
|
Yousafzai, Abdullah |
|
|
26 |
1 |
p. 137-156 |
artikel |
15 |
Blockchain for deep learning: review and open challenges
|
Shafay, Muhammad |
|
|
26 |
1 |
p. 197-221 |
artikel |
16 |
Communication and aging aware application mapping for multicore based edge computing servers
|
Ali, Javid |
|
|
26 |
1 |
p. 223-235 |
artikel |
17 |
Contention-aware container placement strategy for docker swarm with machine learning based clustering algorithms
|
Chiang, Ron C. |
|
|
26 |
1 |
p. 13-23 |
artikel |
18 |
CoPUP: content popularity and user preferences aware content caching framework in mobile edge computing
|
Yasir, Muhammad |
|
|
26 |
1 |
p. 267-281 |
artikel |
19 |
Correction: Static to dynamic transition of RPL protocol from IoT to IoV in static and mobile environments
|
Garg, Sakshi |
|
|
26 |
1 |
p. 863 |
artikel |
20 |
Correction to: High-performance pseudo-anonymization of virtual power plant data on a CPU cluster
|
Abbasi, Mahdi |
|
|
26 |
1 |
p. 513 |
artikel |
21 |
Deep reinforcement learning approach towards a smart parking architecture
|
Awaisi, Kamran Sattar |
|
|
26 |
1 |
p. 255-266 |
artikel |
22 |
Design and realization of a secure multiplicative homomorphic encryption scheme for cloud services
|
Zaraket, Christiana |
|
|
26 |
1 |
p. 685-699 |
artikel |
23 |
Design of cultural emperor penguin optimizer for energy-efficient resource scheduling in green cloud computing environment
|
Mansour, Romany F. |
|
|
26 |
1 |
p. 575-586 |
artikel |
24 |
Detection and prediction of traffic accidents using deep learning techniques
|
Azhar, Anique |
|
|
26 |
1 |
p. 477-493 |
artikel |
25 |
DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments
|
Javadpour, Amir |
|
|
26 |
1 |
p. 367-384 |
artikel |
26 |
Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter
|
Li, Mengyao |
|
|
26 |
1 |
p. 667-684 |
artikel |
27 |
Energy efficient offloading mechanism using particle swarm optimization in 5G enabled edge nodes
|
Bacanin, Nebojsa |
|
|
26 |
1 |
p. 587-598 |
artikel |
28 |
Energy efficient offloading scheme for MEC-based augmented reality system
|
Ateya, Abdelhamied A. |
|
|
26 |
1 |
p. 789-806 |
artikel |
29 |
Enhancing quality of experience in mobile edge computing using deep learning based data offloading and cyberattack detection technique
|
Hilal, Anwer Mustafa |
|
|
26 |
1 |
p. 59-70 |
artikel |
30 |
Enhancing vehicular edge computing system through cooperative computation offloading
|
Lu, Yanfei |
|
|
26 |
1 |
p. 771-788 |
artikel |
31 |
ESPINA: efficient and secured protocol for emerging IoT network applications
|
Bomgni, Alain Bertrand |
|
|
26 |
1 |
p. 85-98 |
artikel |
32 |
Floating Fog: extending fog computing to vast waters for aerial users
|
Hassan, Najmul |
|
|
26 |
1 |
p. 181-195 |
artikel |
33 |
Fraud detection in the distributed graph database
|
Srivastava, Sakshi |
|
|
26 |
1 |
p. 515-537 |
artikel |
34 |
High-performance pseudo-anonymization of virtual power plant data on a CPU cluster
|
Abbasi, Mahdi |
|
|
26 |
1 |
p. 495-512 |
artikel |
35 |
Joint resource trading and computation offloading in blockchain enhanced D2D-assisted mobile edge computing
|
Jing, Weipeng |
|
|
26 |
1 |
p. 635-649 |
artikel |
36 |
Knowledge defined networks on the edge for service function chaining and reactive traffic steering
|
Rafiq, Adeel |
|
|
26 |
1 |
p. 613-634 |
artikel |
37 |
LiMPO: lightweight mobility prediction and offloading framework using machine learning for mobile edge computing
|
Zaman, Sardar Khaliq uz |
|
|
26 |
1 |
p. 99-117 |
artikel |
38 |
Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm
|
Jalasri, M. |
|
|
26 |
1 |
p. 823-836 |
artikel |
39 |
Mapping and embedding infrastructure resource management in software defined networks
|
Javadpour, Amir |
|
|
26 |
1 |
p. 461-475 |
artikel |
40 |
MECpVmS: an SLA aware energy-efficient virtual machine selection policy for green cloud computing
|
Mandal, Riman |
|
|
26 |
1 |
p. 651-665 |
artikel |
41 |
Modeling and simulation of smart grid-aware edge computing federations
|
Cárdenas, Román |
|
|
26 |
1 |
p. 719-743 |
artikel |
42 |
Password authentication key exchange based on key consensus for IoT security
|
Zhao, Zongqu |
|
|
26 |
1 |
p. 1-12 |
artikel |
43 |
PI-sqrt: novel parallel implementations of in-place sequence rotation on multicore systems
|
Hashem, Mervat |
|
|
26 |
1 |
p. 539-557 |
artikel |
44 |
Quality evaluation method of agricultural product packaging image based on structural similarity and MTF
|
Quan, Li |
|
|
26 |
1 |
p. 1-12 |
artikel |
45 |
SFCSim: a network function virtualization resource allocation simulation platform
|
Xu, Lingyi |
|
|
26 |
1 |
p. 423-436 |
artikel |
46 |
Smart sentiment analysis system for pain detection using cutting edge techniques in a smart healthcare framework
|
Ghosh, Anay |
|
|
26 |
1 |
p. 119-135 |
artikel |
47 |
Static to dynamic transition of RPL protocol from IoT to IoV in static and mobile environments
|
Garg, Sakshi |
|
|
26 |
1 |
p. 847-862 |
artikel |
48 |
Task processing optimization using cuckoo particle swarm (CPS) algorithm in cloud computing infrastructure
|
Zavieh, Hadi |
|
|
26 |
1 |
p. 745-769 |
artikel |
49 |
TOS-LRPLM: a task value-aware offloading scheme in IoT edge computing system
|
Sun, Jiayu |
|
|
26 |
1 |
p. 319-335 |
artikel |
50 |
Video transcoding at the edge: cost and feasibility perspective
|
Bukhari, Syed Muhammad Ammar Hassan |
|
|
26 |
1 |
p. 157-180 |
artikel |
51 |
Workload time series prediction in storage systems: a deep learning based approach
|
Ruan, Li |
|
|
26 |
1 |
p. 25-35 |
artikel |
52 |
Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs
|
Rashid, Aqsa |
|
|
26 |
1 |
p. 237-254 |
artikel |