nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive detection and mitigation mechanism to protect SD-IoV systems against controller-targeted DDoS attacks
|
Alemu, Behaylu Tadele |
|
|
27 |
10 |
p. 14295-14313 |
artikel |
2 |
A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks
|
Sharma, Ankit |
|
|
27 |
10 |
p. 13809-13834 |
artikel |
3 |
A hybrid approach of ALNS with alternative initialization and acceptance mechanisms for capacitated vehicle routing problems
|
Kuyu, Yiğit Çağatay |
|
|
27 |
10 |
p. 13583-13606 |
artikel |
4 |
A hybrid butterfly and Newton–Raphson swarm intelligence algorithm based on opposition-based learning
|
Li, Chuan |
|
|
27 |
10 |
p. 14469-14514 |
artikel |
5 |
A hybrid multi-objective algorithm based on slime mould algorithm and sine cosine algorithm for overlapping community detection in social networks
|
Heydariyan, Ahmad |
|
|
27 |
10 |
p. 13897-13917 |
artikel |
6 |
A multi-strategy improved beluga whale optimization algorithm for constrained engineering problems
|
Chen, Xinyi |
|
|
27 |
10 |
p. 14685-14727 |
artikel |
7 |
An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing
|
Shrivastava, Pranav |
|
|
27 |
10 |
p. 13675-13691 |
artikel |
8 |
An efficient quantum oblivious transfer protocol
|
Sarkar, Sushmita |
|
|
27 |
10 |
p. 14037-14048 |
artikel |
9 |
An energy-aware ant colony optimization strategy for virtual machine placement in cloud computing
|
Duan, Lin-Tao |
|
|
27 |
10 |
p. 14269-14282 |
artikel |
10 |
An improved honey badger algorithm for global optimization and multilevel thresholding segmentation: real case with brain tumor images
|
Houssein, Essam H. |
|
|
27 |
10 |
p. 14315-14364 |
artikel |
11 |
An improved moth flame optimization for optimal DG and battery energy storage allocation in distribution systems
|
Elseify, Mohamed A. |
|
|
27 |
10 |
p. 14767-14810 |
artikel |
12 |
An improved scheduling with advantage actor-critic for Storm workloads
|
Dong, Gaoqiang |
|
|
27 |
10 |
p. 13421-13433 |
artikel |
13 |
An improved weighted mean of vectors optimizer for multi-threshold image segmentation: case study of breast cancer
|
Hao, Shuhui |
|
|
27 |
10 |
p. 13945-14004 |
artikel |
14 |
A novel approach for energy consumption management in cloud centers based on adaptive fuzzy neural systems
|
Huang, Hong |
|
|
27 |
10 |
p. 14515-14538 |
artikel |
15 |
A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification
|
Ebrahimi, Seyed Hossein Seyed |
|
|
27 |
10 |
p. 14049-14093 |
artikel |
16 |
A quantitative analysis of the security of PoW-based blockchains
|
Alharby, Maher |
|
|
27 |
10 |
p. 14113-14130 |
artikel |
17 |
A scalable and power efficient MAC protocol with adaptive TDMA for M2M communication
|
Kampelli, Narender Reddy |
|
|
27 |
10 |
p. 14811-14834 |
artikel |
18 |
A survey on privacy-preserving federated learning against poisoning attacks
|
Xia, Feng |
|
|
27 |
10 |
p. 13565-13582 |
artikel |
19 |
A weighted multi-view clustering via sparse graph learning
|
Zhou, Jie |
|
|
27 |
10 |
p. 13517-13530 |
artikel |
20 |
BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment
|
Chaurasia, Akhil |
|
|
27 |
10 |
p. 13919-13944 |
artikel |
21 |
Blockchain enabled secured, smart healthcare system for smart cities: a systematic review on architecture, technology, and service management
|
Samantray, Bhabani Sankar |
|
|
27 |
10 |
p. 14387-14415 |
artikel |
22 |
Blockchain enabled secure pharmaceutical supply chain framework with traceability: an efficient searchable pharmachain approach
|
Mishra, Rahul |
|
|
27 |
10 |
p. 13621-13641 |
artikel |
23 |
BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm
|
Abed-alguni, Bilal H. |
|
|
27 |
10 |
p. 14417-14449 |
artikel |
24 |
Channel estimation for RIS-aided MIMO systems in MmWave wireless communications with a few active elements
|
Ghamry, Walid K. |
|
|
27 |
10 |
p. 14247-14267 |
artikel |
25 |
DDoS attack detection techniques in IoT networks: a survey
|
Pakmehr, Amir |
|
|
27 |
10 |
p. 14637-14668 |
artikel |
26 |
Deep Convolutional Neural Network with a Fuzzy (DCNN-F) technique for energy and time optimized scheduling of cloud computing
|
Rajendran, Logesh |
|
|
27 |
10 |
p. 13763-13775 |
artikel |
27 |
DNA sequences design under many objective evolutionary algorithm
|
Guo, Huaiyu |
|
|
27 |
10 |
p. 14167-14183 |
artikel |
28 |
Empowering bonobo optimizer for global optimization and cloud scheduling problem
|
Mostafa, Reham R. |
|
|
27 |
10 |
p. 14557-14584 |
artikel |
29 |
Empowering e-learning approach by the use of federated edge computing
|
Arfaoui, Nouha |
|
|
27 |
10 |
p. 13737-13748 |
artikel |
30 |
Energy-efficient virtual machine placement in heterogeneous cloud data centers: a clustering-enhanced multi-objective, multi-reward reinforcement learning approach
|
Ghasemi, Arezoo |
|
|
27 |
10 |
p. 14149-14166 |
artikel |
31 |
Enhancing image encryption using chaotic maps: a multi-map approach for robust security and performance optimization
|
Abodawood, Mostafa |
|
|
27 |
10 |
p. 14611-14635 |
artikel |
32 |
Enhancing security and scalability by AI/ML workload optimization in the cloud
|
Priyadarshini, Sabina |
|
|
27 |
10 |
p. 13455-13469 |
artikel |
33 |
Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features
|
Tashtoush, Yahya |
|
|
27 |
10 |
p. 13717-13736 |
artikel |
34 |
File chunking towards on-chain storage: a blockchain-based data preservation framework
|
Tmeizeh, Muhammed |
|
|
27 |
10 |
p. 13531-13546 |
artikel |
35 |
G-SAM: GMM-based segment anything model for medical image classification and segmentation
|
Liu, Xiaoxiao |
|
|
27 |
10 |
p. 14231-14245 |
artikel |
36 |
HPTCollector: high-performance telemetry collector
|
Hussain, Mazahir |
|
|
27 |
10 |
p. 14729-14744 |
artikel |
37 |
Intelligent and efficient task caching for mobile edge computing
|
Moradi, Amir |
|
|
27 |
10 |
p. 14095-14112 |
artikel |
38 |
Lattice-based ring signcryption scheme for smart healthcare management
|
Sourav, |
|
|
27 |
10 |
p. 14131-14148 |
artikel |
39 |
Leveraging large language model to generate a novel metaheuristic algorithm with CRISPE framework
|
Zhong, Rui |
|
|
27 |
10 |
p. 13835-13869 |
artikel |
40 |
Localization of try block and generation of catch block to handle exception using an improved LSTM
|
Purohit, Preetesh |
|
|
27 |
10 |
p. 14451-14468 |
artikel |
41 |
Metaheuristic algorithms and their applications in wireless sensor networks: review, open issues, and challenges
|
Houssein, Essam H. |
|
|
27 |
10 |
p. 13643-13673 |
artikel |
42 |
Migration of containers on the basis of load prediction with dynamic inertia weight based PSO algorithm
|
Bawa, Shabnam |
|
|
27 |
10 |
p. 14585-14609 |
artikel |
43 |
MTV-SCA: multi-trial vector-based sine cosine algorithm
|
Nadimi-Shahraki, Mohammad H. |
|
|
27 |
10 |
p. 13471-13515 |
artikel |
44 |
Multi-attention gated temporal graph convolution neural Network for traffic flow forecasting
|
Huang, Xiaohui |
|
|
27 |
10 |
p. 13795-13808 |
artikel |
45 |
Multi-strategy improved sparrow search algorithm based on first definition of ellipse and group co-evolutionary mechanism for engineering optimization problems
|
Chen, Gang |
|
|
27 |
10 |
p. 14005-14035 |
artikel |
46 |
Multi-threshold image segmentation using a boosted whale optimization: case study of breast invasive ductal carcinomas
|
Shi, Jinge |
|
|
27 |
10 |
p. 14891-14949 |
artikel |
47 |
Nature inspired optimization algorithms for medical image segmentation: a comprehensive review
|
Houssein, Essam H. |
|
|
27 |
10 |
p. 14745-14766 |
artikel |
48 |
OntoXAI: a semantic web rule language approach for explainable artificial intelligence
|
Sharma, Sumit |
|
|
27 |
10 |
p. 14951-14975 |
artikel |
49 |
Performance analysis of ML models on 5G sub-6 GHz bands: An experimental study
|
Reddy, Avuthu Avinash |
|
|
27 |
10 |
p. 14283-14294 |
artikel |
50 |
PSO-ACO-based bi-phase lightweight intrusion detection system combined with GA optimized ensemble classifiers
|
Srivastava, Arpita |
|
|
27 |
10 |
p. 14835-14890 |
artikel |
51 |
PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model
|
Sharma, Sangeeta |
|
|
27 |
10 |
p. 13749-13762 |
artikel |
52 |
Quantitative and qualitative similarity measure for data clustering analysis
|
AlShaqsi, Jamil |
|
|
27 |
10 |
p. 14977-15002 |
artikel |
53 |
Research and optimization of task scheduling algorithm based on heterogeneous multi-core processor
|
Liu, Junnan |
|
|
27 |
10 |
p. 13435-13453 |
artikel |
54 |
Saver: a proactive microservice resource scheduling strategy based on STGCN
|
Jiang, Yi |
|
|
27 |
10 |
p. 13547-13564 |
artikel |
55 |
Secure speech-recognition data transfer in the internet of things using a power system and a tried-and-true key generation technique
|
Wang, Zhe |
|
|
27 |
10 |
p. 14669-14684 |
artikel |
56 |
Service selection based on blockchain smart contracts in cloud-edge environment
|
Ning, Yingying |
|
|
27 |
10 |
p. 13693-13715 |
artikel |
57 |
Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication
|
Boualem, Adda |
|
|
27 |
10 |
p. 13777-13793 |
artikel |
58 |
Stochastic biogeography-based learning improved RIME algorithm: application to image segmentation of lupus nephritis
|
Zheng, Boli |
|
|
27 |
10 |
p. 14185-14229 |
artikel |
59 |
TFCNN-BiGRU with self-attention mechanism for automatic human emotion recognition using multi-channel EEG data
|
Houssein, Essam H. |
|
|
27 |
10 |
p. 14365-14385 |
artikel |
60 |
TruPro: a blockchain-based decentralised prosumer electricity trading platform for electrical vehicles (EVs)
|
Khan, Kashif Mehboob |
|
|
27 |
10 |
p. 13871-13896 |
artikel |
61 |
Vehicle edge server deployment based on reinforcement learning in cloud-edge collaborative environment
|
Guo, Feiyan |
|
|
27 |
10 |
p. 14539-14556 |
artikel |
62 |
Visual identification of sleep spindles in EEG waveform images using deep learning object detection (YOLOv4 vs YOLOX)
|
Fraiwan, Mohammad |
|
|
27 |
10 |
p. 13607-13620 |
artikel |