nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain scheme for authentication, data sharing and nonrepudiation to secure internet of wireless sensor things
|
Khan, Asad Ullah |
|
|
26 |
2 |
p. 945-960 |
artikel |
2 |
Abstracting IoT protocols using timed process algebra and SPIN model checker
|
Suresh Kumar, N. |
|
|
26 |
2 |
p. 1611-1629 |
artikel |
3 |
AI-based Bayesian inference scheme to recognize electroencephalogram signals for smart healthcare
|
Hong, Puah Jia |
|
|
26 |
2 |
p. 1221-1230 |
artikel |
4 |
A multichannel EfficientNet deep learning-based stacking ensemble approach for lung disease detection using chest X-ray images
|
Ravi, Vinayakumar |
|
|
26 |
2 |
p. 1181-1203 |
artikel |
5 |
An adaptive and secure routes migration model for the sustainable cloud of things
|
Islam, Naveed |
|
|
26 |
2 |
p. 1631-1642 |
artikel |
6 |
An adaptive read/write optimized algorithm for Ceph heterogeneous systems via performance prediction and multi-attribute decision making
|
Li, Zhike |
|
|
26 |
2 |
p. 1125-1146 |
artikel |
7 |
An AI-empowered affect recognition model for healthcare and emotional well-being using physiological signals
|
Zhou, Zijian |
|
|
26 |
2 |
p. 1253-1266 |
artikel |
8 |
An attentive hierarchy ConvNet for crowd counting in smart city
|
Zhai, Wenzhe |
|
|
26 |
2 |
p. 1099-1111 |
artikel |
9 |
A near-optimal & load balanced resilient system design for high-performance computing platform
|
Kamila, Nilayam Kumar |
|
|
26 |
2 |
p. 1535-1550 |
artikel |
10 |
An ECC processor for IoT using Edwards curves and DFT modular multiplication
|
Al-Khaleel, Osama |
|
|
26 |
2 |
p. 1063-1075 |
artikel |
11 |
An evaluation of deep learning models for chargeback Fraud detection in online games
|
Wei, Yu-Chih |
|
|
26 |
2 |
p. 927-943 |
artikel |
12 |
An improved hash algorithm for monitoring network traffic in the internet of things
|
Zhan, Teng |
|
|
26 |
2 |
p. 961-976 |
artikel |
13 |
A novel design of a dependable and fault-tolerant multi-layer banyan network based on a crossbar switch for nano communication
|
Li, Shaoxi |
|
|
26 |
2 |
p. 1601-1609 |
artikel |
14 |
A novel multi agent recommender system for user interests extraction
|
Mansour, Ayman M. |
|
|
26 |
2 |
p. 1353-1362 |
artikel |
15 |
A pre-trained convolutional neural network with optimized capsule networks for chest X-rays COVID-19 diagnosis
|
AbouEl-Magd, Lobna M. |
|
|
26 |
2 |
p. 1389-1403 |
artikel |
16 |
A survey on deep learning-based identification of plant and crop diseases from UAV-based aerial images
|
Bouguettaya, Abdelmalek |
|
|
26 |
2 |
p. 1297-1317 |
artikel |
17 |
A two-dimensional OMA-NOMA user-pairing and power-minimization approach for opportunistic B5G-enabled IoT networks
|
Bany Salameh, Haythem |
|
|
26 |
2 |
p. 1113-1124 |
artikel |
18 |
Business intelligence using deep learning techniques for social media contents
|
Kanan, Tarek |
|
|
26 |
2 |
p. 1285-1296 |
artikel |
19 |
DCOPA: a distributed clustering based on objects performances aggregation for hierarchical communications in IoT applications
|
Mir, Foudil |
|
|
26 |
2 |
p. 1077-1098 |
artikel |
20 |
Deep learning application detecting SARS-CoV-2 key enzymes inhibitors
|
Benarous, Leila |
|
|
26 |
2 |
p. 1169-1180 |
artikel |
21 |
Deep reinforcement learning-based microservice selection in mobile edge computing
|
Guo, Feiyan |
|
|
26 |
2 |
p. 1319-1335 |
artikel |
22 |
Edge computing based secure health monitoring framework for electronic healthcare system
|
Singh, Ashish |
|
|
26 |
2 |
p. 1205-1220 |
artikel |
23 |
Edge resource slicing approaches for latency optimization in AI-edge orchestration
|
Chandrika, P. Keerthi |
|
|
26 |
2 |
p. 1659-1683 |
artikel |
24 |
EHHR: an efficient evolutionary hyper-heuristic based recommender framework for short-text classifier selection
|
Almas, Bushra |
|
|
26 |
2 |
p. 1425-1446 |
artikel |
25 |
Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine
|
Pavithran, Pramod |
|
|
26 |
2 |
p. 1035-1051 |
artikel |
26 |
Federated learning for energy constrained devices: a systematic mapping study
|
El Mokadem, Rachid |
|
|
26 |
2 |
p. 1685-1708 |
artikel |
27 |
Fusion of deep learning based cyberattack detection and classification model for intelligent systems
|
Alzubi, Omar A. |
|
|
26 |
2 |
p. 1363-1374 |
artikel |
28 |
Group intrusion detection in the Internet of Things using a hybrid recurrent neural network
|
Belhadi, Asma |
|
|
26 |
2 |
p. 1147-1158 |
artikel |
29 |
HeuCrip: a malware detection approach for internet of battlefield things
|
shah, Imtiaz Ali |
|
|
26 |
2 |
p. 977-992 |
artikel |
30 |
Improving virtualization and migration in combinatorial dynamic mapping for cloud services
|
Gorjian Mehlabani, Ehsan |
|
|
26 |
2 |
p. 1511-1533 |
artikel |
31 |
K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing
|
Ling, Chen |
|
|
26 |
2 |
p. 1495-1510 |
artikel |
32 |
Lightweight Gramian Angular Field classification for edge internet of energy applications
|
Alsalemi, Abdullah |
|
|
26 |
2 |
p. 1375-1387 |
artikel |
33 |
Mitigating voltage fingerprint spoofing attacks on the controller area network bus
|
Lalouani, Wassila |
|
|
26 |
2 |
p. 1447-1460 |
artikel |
34 |
MO-FreeVM: multi-objective server release algorithm for cluster resource management
|
Zhang, Shiyan |
|
|
26 |
2 |
p. 1011-1034 |
artikel |
35 |
Multi-factor nature inspired SLA-aware energy efficient resource management for cloud environments
|
Bashir, Sonia |
|
|
26 |
2 |
p. 1643-1658 |
artikel |
36 |
MultiHop optimal time complexity clustering for emerging IoT applications
|
Mtopi, Yann Brice Chebu |
|
|
26 |
2 |
p. 993-1009 |
artikel |
37 |
On detecting distributed denial of service attacks using fuzzy inference system
|
Almseidin, Mohammad |
|
|
26 |
2 |
p. 1337-1351 |
artikel |
38 |
Popular deep learning algorithms for disease prediction: a review
|
Yu, Zengchen |
|
|
26 |
2 |
p. 1231-1251 |
artikel |
39 |
Reinforcement learning for intelligent online computation offloading in wireless powered edge networks
|
Mustafa, Ehzaz |
|
|
26 |
2 |
p. 1053-1062 |
artikel |
40 |
Resilient and dependability management in distributed environments: a systematic and comprehensive literature review
|
Amiri, Zahra |
|
|
26 |
2 |
p. 1565-1600 |
artikel |
41 |
Security enhancement in cellular networks employing D2D friendly jammer for V2V communication
|
Kumar, J. Senthil |
|
|
26 |
2 |
p. 865-878 |
artikel |
42 |
Security in IoT-enabled smart agriculture: architecture, security solutions and challenges
|
Vangala, Anusha |
|
|
26 |
2 |
p. 879-902 |
artikel |
43 |
TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms
|
Sudar, K. Muthamil |
|
|
26 |
2 |
p. 1461-1477 |
artikel |
44 |
The effect of QoS and QoE requirements for designing task processing controller based on fuzzy logic on IoT environments
|
Yang, Zhengqiang |
|
|
26 |
2 |
p. 1267-1283 |
artikel |
45 |
Towards a secure and dependable IoT data monetization using blockchain and fog computing
|
Khezr, Seyednima |
|
|
26 |
2 |
p. 1551-1564 |
artikel |
46 |
Towards performance evaluation prediction in WSNs using artificial neural network multi-perceptron
|
Zroug, Siham |
|
|
26 |
2 |
p. 1405-1423 |
artikel |
47 |
TrIDS: an intelligent behavioural trust based IDS for smart healthcare system
|
Singh, Ashish |
|
|
26 |
2 |
p. 903-925 |
artikel |
48 |
Using recommender clustering to improve quality of services with sustainable virtual machines in cloud computing
|
Aghaei, Mehran |
|
|
26 |
2 |
p. 1479-1493 |
artikel |
49 |
Video coding deep learning-based modeling for long life video streaming over next network generation
|
Alsmirat, Mohammad |
|
|
26 |
2 |
p. 1159-1167 |
artikel |