nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A BERT-based recommender system for secure blockchain-based cyber physical drug supply chain management
|
Yazdinejad, Abbas |
|
|
26 |
6 |
p. 3389-3403 |
artikel |
2 |
A blockchain-based IoT data marketplace
|
Sober, Michael |
|
|
26 |
6 |
p. 3523-3545 |
artikel |
3 |
A data-driven analysis of renewable energy management: a case study of wind energy technology
|
Altuntas, Fatma |
|
|
26 |
6 |
p. 4133-4152 |
artikel |
4 |
A machine learning framework for security and privacy issues in building trust for social networking
|
Bhadoria, Robin Singh |
|
|
26 |
6 |
p. 3907-3930 |
artikel |
5 |
A multi-illusive voids approach for increasing base station anonymity
|
Boulaiche, Mehdi |
|
|
26 |
6 |
p. 3997-4013 |
artikel |
6 |
A multi-objective task offloading based on BBO algorithm under deadline constrain in mobile edge computing
|
Li, Hongjian |
|
|
26 |
6 |
p. 4051-4067 |
artikel |
7 |
An efficient energy-aware and service quality improvement strategy applied in cloud computing
|
Wang, Jinjiang |
|
|
26 |
6 |
p. 4031-4049 |
artikel |
8 |
A new approach based on game theory to reflect meta-cluster dependencies into VoIP attack detection using ensemble clustering
|
Bavifard, Farid |
|
|
26 |
6 |
p. 3889-3906 |
artikel |
9 |
A new QoS-aware method for production scheduling in the industrial internet of things using elephant herding optimization algorithm
|
Avval, Danial Bakhshayeshi |
|
|
26 |
6 |
p. 3611-3626 |
artikel |
10 |
An optimized deep networks for securing 5g communication system
|
Naveena, Ambidi |
|
|
26 |
6 |
p. 4015-4029 |
artikel |
11 |
A quantum inspired hybrid SSA–GWO algorithm for SLA based task scheduling to improve QoS parameter in cloud computing
|
Jain, Richa |
|
|
26 |
6 |
p. 3587-3610 |
artikel |
12 |
A survey on machine and deep learning in semiconductor industry: methods, opportunities, and challenges
|
Huang, An Chi |
|
|
26 |
6 |
p. 3437-3472 |
artikel |
13 |
B-FLACS: blockchain-based flexible lightweight access control scheme for data sharing in cloud
|
Tao, Qi |
|
|
26 |
6 |
p. 3931-3941 |
artikel |
14 |
Channel estimation for massive MIMO system using the shannon entropy function
|
Albataineh, Zaid |
|
|
26 |
6 |
p. 3793-3801 |
artikel |
15 |
Chatgpt for cybersecurity: practical applications, challenges, and future directions
|
Al-Hawawreh, Muna |
|
|
26 |
6 |
p. 3421-3436 |
artikel |
16 |
CNN with machine learning approaches using ExtraTreesClassifier and MRMR feature selection techniques to detect liver diseases on cloud
|
Lanjewar, Madhusudan G |
|
|
26 |
6 |
p. 3657-3672 |
artikel |
17 |
Container-based task scheduling in cloud-edge collaborative environment using priority-aware greedy strategy
|
Tang, Bing |
|
|
26 |
6 |
p. 3689-3705 |
artikel |
18 |
Controller deployment based on network partition and collaborative scheduling on MEC
|
Li, Chunlin |
|
|
26 |
6 |
p. 4085-4099 |
artikel |
19 |
Cooperative hybrid consensus with function optimization for blockchain
|
Ipchi Sheshgelani, Mohammadreza |
|
|
26 |
6 |
p. 3565-3576 |
artikel |
20 |
Correction: A BERT-based recommender system for secure blockchain-based cyber physical drug supply chain management
|
Yazdinejad, Abbas |
|
|
26 |
6 |
p. 3405 |
artikel |
21 |
Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger
|
Iftikhar, Zainab |
|
|
26 |
6 |
p. 3379 |
artikel |
22 |
Decision making for cloud service selection: a novel and hybrid MCDM approach
|
Tomar, Abhinav |
|
|
26 |
6 |
p. 3869-3887 |
artikel |
23 |
Decision-making of transportation vehicle routing based on particle swarm optimization algorithm in logistics distribution management
|
Cai, Linya |
|
|
26 |
6 |
p. 3707-3718 |
artikel |
24 |
Detection of K-complexes in EEG signals using deep transfer learning and YOLOv3
|
Khasawneh, Natheer |
|
|
26 |
6 |
p. 3985-3995 |
artikel |
25 |
Efficient job placement using two-way offloading technique over fog-cloud architectures
|
Khan, Saad Ahmad |
|
|
26 |
6 |
p. 3503-3521 |
artikel |
26 |
Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems
|
Wang, Zhiqiang |
|
|
26 |
6 |
p. 3839-3854 |
artikel |
27 |
Enhanced multi-objective virtual machine replacement in cloud data centers: combinations of fuzzy logic with reinforcement learning and biogeography-based optimization algorithms
|
Ghasemi, Arezoo |
|
|
26 |
6 |
p. 3855-3868 |
artikel |
28 |
Estimation of execution time for computing tasks
|
Bielecki, Jan |
|
|
26 |
6 |
p. 3943-3956 |
artikel |
29 |
Examining deep learning’s capability to spot code smells: a systematic literature review
|
Malhotra, Ruchika |
|
|
26 |
6 |
p. 3473-3501 |
artikel |
30 |
GMM-LSTM: a component driven resource utilization prediction model leveraging LSTM and gaussian mixture model
|
Garg, Sheetal |
|
|
26 |
6 |
p. 3547-3563 |
artikel |
31 |
Gpu-based and streaming-enabled implementation of pre-processing flow towards enhancing optical character recognition accuracy and efficiency
|
Serhan, Gener |
|
|
26 |
6 |
p. 3407-3419 |
artikel |
32 |
High-capacity reversible data hiding in encrypted images based on adaptive arithmetic coding and static Huffman coding
|
Liu, Mengqi |
|
|
26 |
6 |
p. 3627-3645 |
artikel |
33 |
Intelligent control method of main road traffic flow based on multi-sensor information fusion
|
Deng, Zhao |
|
|
26 |
6 |
p. 3577-3586 |
artikel |
34 |
Intelligent intrusion detection based on fuzzy Big Data classification
|
Jemili, Farah |
|
|
26 |
6 |
p. 3719-3736 |
artikel |
35 |
Internet of Things intrusion detection systems: a comprehensive review and future directions
|
Heidari, Arash |
|
|
26 |
6 |
p. 3753-3780 |
artikel |
36 |
lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning
|
Hazman, Chaimae |
|
|
26 |
6 |
p. 4069-4083 |
artikel |
37 |
Light-weight privacy enabled topology establishment and communication protocol for swarm IoT networks
|
Sheena, N. |
|
|
26 |
6 |
p. 4101-4117 |
artikel |
38 |
Multi objective task scheduling algorithm in cloud computing using grey wolf optimization
|
Mangalampalli, Sudheer |
|
|
26 |
6 |
p. 3803-3822 |
artikel |
39 |
Numerical simulation of the land subsidence induced by groundwater mining
|
Chen, Hong |
|
|
26 |
6 |
p. 3647-3656 |
artikel |
40 |
Performance enhancement of vision based fall detection using ensemble of machine learning model
|
Rastogi, Shikha |
|
|
26 |
6 |
p. 4119-4132 |
artikel |
41 |
Performance evaluation and optimization of long range IoT network using whale optimization algorithm
|
Kaur, Gagandeep |
|
|
26 |
6 |
p. 3737-3751 |
artikel |
42 |
Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger
|
Iftikhar, Zainab |
|
|
26 |
6 |
p. 3361-3377 |
artikel |
43 |
QoS correlation-based service composition algorithm for multi-constraint optimal path selection
|
Yu, Jian |
|
|
26 |
6 |
p. 3823-3837 |
artikel |
44 |
Real-time progressive compression method of massive data based on improved clustering algorithm
|
Yang, Hengxiang |
|
|
26 |
6 |
p. 3781-3791 |
artikel |
45 |
Retraction Note: Discrete Noetherian ring variational pattern feature sets for space-air-ground network protocol monitoring
|
Lin, Wenliang |
|
|
26 |
6 |
p. 4153 |
artikel |
46 |
Retraction Note: Unsaturated dynamic constitutive model under cyclic loading
|
Cui, Kai |
|
|
26 |
6 |
p. 4155 |
artikel |
47 |
Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud
|
Shrivastava, Pranav |
|
|
26 |
6 |
p. 3673-3688 |
artikel |
48 |
Slow Subscribers: a novel IoT-MQTT based denial of service attack
|
Liu, Yifeng |
|
|
26 |
6 |
p. 3973-3984 |
artikel |
49 |
Small files access efficiency in hadoop distributed file system a case study performed on British library text files
|
Alange, Neeta |
|
|
26 |
6 |
p. 3381-3388 |
artikel |
50 |
XACSim: a new tool for measuring similarity of XACML security policies
|
Katebi, Zahra |
|
|
26 |
6 |
p. 3957-3972 |
artikel |