nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A better and fast cloud intrusion detection system using improved squirrel search algorithm and modified deep belief network
|
Sarkar, Nairita |
|
|
27 |
2 |
p. 1699-1718 |
artikel |
2 |
A collusion-resistant certificateless provable data possession scheme for shared data with user revocation
|
Yang, Guang |
|
|
27 |
2 |
p. 2165-2179 |
artikel |
3 |
A comprehensive comparison study of traditional classifiers and deep neural networks for forest fire detection
|
Akyol, Kemal |
|
|
27 |
2 |
p. 1201-1215 |
artikel |
4 |
A computationally efficient and randomized RLWE-based key exchange scheme
|
Pursharthi, Komal |
|
|
27 |
2 |
p. 1599-1610 |
artikel |
5 |
A controller-based roadside unit plane architecture for software-defined internet of vehicles
|
Mao, Ming |
|
|
27 |
2 |
p. 1235-1249 |
artikel |
6 |
ACPM: adaptive container provisioning model to mitigate serverless cold-start
|
Kumari, Anisha |
|
|
27 |
2 |
p. 1333-1360 |
artikel |
7 |
A deep learning approach for detecting covert timing channel attacks using sequential data
|
Al-Eidi, Shorouq |
|
|
27 |
2 |
p. 1655-1665 |
artikel |
8 |
A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture
|
Shukla, Shivangi |
|
|
27 |
2 |
p. 1559-1580 |
artikel |
9 |
A distributed B+Tree indexing method for processing range queries over streaming data
|
Safaee, Shahab |
|
|
27 |
2 |
p. 1251-1274 |
artikel |
10 |
A genetic-based clustering algorithm for efficient resource allocating of IoT applications in layered fog heterogeneous platforms
|
Abedpour, Kimia |
|
|
27 |
2 |
p. 1313-1331 |
artikel |
11 |
A JAYA algorithm based on normal clouds for DNA sequence optimization
|
Zhu, Donglin |
|
|
27 |
2 |
p. 2133-2149 |
artikel |
12 |
A machine learning-based optimization approach for pre-copy live virtual machine migration
|
Haris, Raseena M. |
|
|
27 |
2 |
p. 1293-1312 |
artikel |
13 |
A meta reinforcement learning-based virtual machine placement algorithm in mobile edge computing
|
Xu, Hao |
|
|
27 |
2 |
p. 1883-1896 |
artikel |
14 |
An efficient cloud resource exchange model based on the double auction and evolutionary game theory
|
Ghasemian Koochaksaraei, Mohammad Hossein |
|
|
27 |
2 |
p. 2291-2307 |
artikel |
15 |
An efficient edge caching approach for SDN-based IoT environments utilizing the moth flame clustering algorithm
|
Jazaeri, Seyedeh Shabnam |
|
|
27 |
2 |
p. 1503-1525 |
artikel |
16 |
An efficient multi-objective scheduling algorithm based on spider monkey and ant colony optimization in cloud computing
|
Amer, Dina A. |
|
|
27 |
2 |
p. 1799-1819 |
artikel |
17 |
An improved arithmetic optimization algorithm for task offloading in mobile edge computing
|
Li, Hongjian |
|
|
27 |
2 |
p. 1667-1682 |
artikel |
18 |
A novel and secure image encryption scheme based on two-dimensional logistic and Arnold Cat map
|
Akraam, Muhammad |
|
|
27 |
2 |
p. 2029-2048 |
artikel |
19 |
A novel seq2seq-based prediction approach for workflow scheduling
|
Yang, Zhongguo |
|
|
27 |
2 |
p. 1897-1910 |
artikel |
20 |
A novel sparrow search algorithm with integrates spawning strategy
|
Zhang, Jiaxiang |
|
|
27 |
2 |
p. 1753-1773 |
artikel |
21 |
A privacy-enhanced human activity recognition using GAN & entropy ranking of microaggregated data
|
Aleroud, Ahmed |
|
|
27 |
2 |
p. 2117-2132 |
artikel |
22 |
A retrieval method of learners’ behavior features based on K-means clustering algorithm
|
Wang, Shaohua |
|
|
27 |
2 |
p. 2049-2058 |
artikel |
23 |
Blockchain based reputation management, data storage and distributed revocation in vehicular energy networks in smart health care systems
|
Jamal, Abid |
|
|
27 |
2 |
p. 2151-2163 |
artikel |
24 |
Cloning-based virtual machine pre-provisioning for resource-constrained edge cloud server
|
Sung, Jungwoong |
|
|
27 |
2 |
p. 1831-1847 |
artikel |
25 |
Cloud benchmarking and performance analysis of an HPC application in Amazon EC2
|
Dancheva, Tamara |
|
|
27 |
2 |
p. 2273-2290 |
artikel |
26 |
Computational approaches to detect experts in distributed online communities: a case study on Reddit
|
Strukova, Sofia |
|
|
27 |
2 |
p. 2181-2201 |
artikel |
27 |
Correction: Scalable NUMA-aware persistent B+-tree for non-volatile memory devices
|
Jamil, Safdar |
|
|
27 |
2 |
p. 2309 |
artikel |
28 |
CSADE: a delay-sensitive scheduling method based on task admission and delay evaluation on edge–cloud collaboration
|
Zuo, Liyun |
|
|
27 |
2 |
p. 1541-1558 |
artikel |
29 |
CUDA-aware MPI implementation of Gibbs sampling for an IRT model
|
Welling, William S. |
|
|
27 |
2 |
p. 1821-1830 |
artikel |
30 |
EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks
|
Shukla, Praveen |
|
|
27 |
2 |
p. 1471-1490 |
artikel |
31 |
Emotion and sentiment analysis for intelligent customer service conversation using a multi-task ensemble framework
|
Chen, Duan |
|
|
27 |
2 |
p. 2099-2115 |
artikel |
32 |
Framework for wrapping binary swarm optimizers to the hybrid parallel cooperative coevolving version
|
Ipchi Sheshgelani, Mohammadreza |
|
|
27 |
2 |
p. 1683-1697 |
artikel |
33 |
Human–object interaction recognition based on interactivity detection and multi-feature fusion
|
Xia, Limin |
|
|
27 |
2 |
p. 1169-1183 |
artikel |
34 |
Hybrid cuckoo finch optimisation based machine learning classifier for seizure prediction using EEG signals in IoT network
|
Kapoor, Bhaskar |
|
|
27 |
2 |
p. 2239-2260 |
artikel |
35 |
Hybrid modified particle swarm optimization with genetic algorithm (GA) based workflow scheduling in cloud-fog environment for multi-objective optimization
|
Singh, Gyan |
|
|
27 |
2 |
p. 1947-1964 |
artikel |
36 |
Improved Harris Hawks optimization for global optimization and engineering design
|
Chen, Lei |
|
|
27 |
2 |
p. 2003-2027 |
artikel |
37 |
Improved Harris Hawks Optimizer with chaotic maps and opposition-based learning for task scheduling in cloud environment
|
Ghafari, R. |
|
|
27 |
2 |
p. 1421-1469 |
artikel |
38 |
Improving the accuracy of diagnosing and predicting coronary heart disease using ensemble method and feature selection techniques
|
Asif, Sohaib |
|
|
27 |
2 |
p. 1927-1946 |
artikel |
39 |
Improving UWB ranging accuracy via multiple network model with second order motion prediction
|
Xing, Guangwei |
|
|
27 |
2 |
p. 2261-2272 |
artikel |
40 |
InPlaceKV: in-place update scheme for SSD-based KV storage systems under update-intensive Worklaods
|
Zhao, Jianing |
|
|
27 |
2 |
p. 1527-1540 |
artikel |
41 |
Integrated method for distributed processing of large XML data
|
Chen, Rongxin |
|
|
27 |
2 |
p. 1375-1399 |
artikel |
42 |
Intrusion detection in internet of things-based smart farming using hybrid deep learning framework
|
Kethineni, Keerthi |
|
|
27 |
2 |
p. 1719-1732 |
artikel |
43 |
Knowledge-based multi-objective estimation of distribution algorithm for solving reliability constrained cloud workflow scheduling
|
Li, Ming |
|
|
27 |
2 |
p. 1401-1419 |
artikel |
44 |
Maximizing utility by optimal capacity division in P2P networks
|
Singha, Nitin |
|
|
27 |
2 |
p. 1159-1168 |
artikel |
45 |
MOM-VMP: multi-objective mayfly optimization algorithm for VM placement supported by principal component analysis (PCA) in cloud data center
|
Durairaj, Selvam |
|
|
27 |
2 |
p. 1733-1751 |
artikel |
46 |
Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application
|
Mora, Higinio |
|
|
27 |
2 |
p. 1849-1865 |
artikel |
47 |
New Spark solutions for distributed frequent itemset and association rule mining algorithms
|
Fernandez-Basso, Carlos |
|
|
27 |
2 |
p. 1217-1234 |
artikel |
48 |
Ordered balancing: load balancing for redundant task scheduling in robotic network cloud systems
|
Alirezazadeh, Saeid |
|
|
27 |
2 |
p. 1185-1200 |
artikel |
49 |
Parallel mutation testing for large scale systems
|
Cañizares, Pablo C. |
|
|
27 |
2 |
p. 2071-2097 |
artikel |
50 |
Product recommendation using enhanced convolutional neural network for e-commerce platform
|
Latha, Yarasu Madhavi |
|
|
27 |
2 |
p. 1639-1653 |
artikel |
51 |
Profit-maximization spectrum sharing in opportunistic duopoly market under dynamic spectrum pricing and QoS constraints
|
Bany Salameh, Haythem |
|
|
27 |
2 |
p. 1491-1502 |
artikel |
52 |
Prototypical contrastive learning for image classification
|
Yang, Han |
|
|
27 |
2 |
p. 2059-2069 |
artikel |
53 |
Ransomware early detection using deep reinforcement learning on portable executable header
|
Deng, XiZhen |
|
|
27 |
2 |
p. 1867-1881 |
artikel |
54 |
Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques
|
Abid, Ahlem |
|
|
27 |
2 |
p. 2217-2238 |
artikel |
55 |
Retraction Note: Agricultural product monitoring system supported by cloud computing
|
Jinbo, Chen |
|
|
27 |
2 |
p. 2311 |
artikel |
56 |
Secure cloud storage auditing with deduplication and efficient data transfer
|
Yu, Jingze |
|
|
27 |
2 |
p. 2203-2215 |
artikel |
57 |
Secure itemset hiding in smart city sensor data
|
Srivastava, Gautam |
|
|
27 |
2 |
p. 1361-1374 |
artikel |
58 |
Secure transfer of robust healthcare data using blockchain-based privacy
|
Kumar, Maddila Suresh |
|
|
27 |
2 |
p. 1275-1291 |
artikel |
59 |
Securing the medical data using enhanced privacy preserving based blockchain technology in Internet of Things
|
Vatambeti, Ramesh |
|
|
27 |
2 |
p. 1625-1637 |
artikel |
60 |
Self-supervised deep subspace clustering with entropy-norm
|
Zhao, Guangyi |
|
|
27 |
2 |
p. 1611-1623 |
artikel |
61 |
Spark-based cooperative coevolution for large scale global optimization
|
Kelkawi, Ali |
|
|
27 |
2 |
p. 1911-1926 |
artikel |
62 |
Supporting dynamic update scheme for assured deletion based-multi-copy association tree
|
Tian, Junfeng |
|
|
27 |
2 |
p. 1983-2001 |
artikel |
63 |
Task and resource allocation in the internet of things based on an improved version of the moth-flame optimization algorithm
|
Nematollahi, Masoud |
|
|
27 |
2 |
p. 1775-1797 |
artikel |
64 |
Two-stage scheduling for a fluctuant big data stream on heterogeneous servers with multicores in a data center
|
Wang, Shun |
|
|
27 |
2 |
p. 1581-1597 |
artikel |
65 |
User request-based scheduling algorithms by managing uncertainty of renewable energy
|
Padhi, Slokashree |
|
|
27 |
2 |
p. 1965-1982 |
artikel |