nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain assisted public auditing scheme for cloud-based digital twin healthcare services
|
Kumari, Deepika |
|
|
27 |
3 |
p. 2593-2609 |
artikel |
2 |
A comparative study of optimization algorithms for feature selection on ML-based classification of agricultural data
|
Garip, Zeynep |
|
|
27 |
3 |
p. 3341-3362 |
artikel |
3 |
Adaptive cloud resource allocation for large-scale crowdsourced multimedia live streaming services
|
Kim, Jeong-Hoon |
|
|
27 |
3 |
p. 3233-3257 |
artikel |
4 |
A decentralized blockchain-based authentication scheme for cross-communication in IoT networks
|
Chaira, Mahmoud |
|
|
27 |
3 |
p. 2505-2523 |
artikel |
5 |
A low-cost, high-throughput neuromorphic computer for online SNN learning
|
Siddique, Ali |
|
|
27 |
3 |
p. 2447-2464 |
artikel |
6 |
A method of system selection for shuttle-based storage and retrieval system considering cost and performance
|
Yang, Dong |
|
|
27 |
3 |
p. 3703-3716 |
artikel |
7 |
An efficient firefly and honeybee based load balancing mechanism in cloud infrastructure
|
Srivastava, Ankita |
|
|
27 |
3 |
p. 2805-2827 |
artikel |
8 |
A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things
|
Souri, Alireza |
|
|
27 |
3 |
p. 3639-3655 |
artikel |
9 |
A new hybrid multi-objective optimization algorithm for task scheduling in cloud systems
|
Malti, Arslan Nedhir |
|
|
27 |
3 |
p. 2525-2548 |
artikel |
10 |
A novel DDoS detection and mitigation technique using hybrid machine learning model and redirect illegitimate traffic in SDN network
|
Singh, Avtar |
|
|
27 |
3 |
p. 3537-3557 |
artikel |
11 |
A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis
|
Chaudhari, Ashish |
|
|
27 |
3 |
p. 3753-3769 |
artikel |
12 |
A novel revocation management for distributed environment: a detailed study
|
Santhosh, Gayathri |
|
|
27 |
3 |
p. 2947-2958 |
artikel |
13 |
AP-Net: a metallic surface defect detection approach with lightweight adaptive attention and enhanced feature pyramid
|
Chen, Faquan |
|
|
27 |
3 |
p. 3837-3851 |
artikel |
14 |
Application and user-specific data prefetching and parallel read algorithms for distributed file systems
|
Nalajala, Anusha |
|
|
27 |
3 |
p. 3593-3613 |
artikel |
15 |
A security framework to enhance IoT device identity and data access through blockchain consensus model
|
Janani, Kariyappa |
|
|
27 |
3 |
p. 2877-2900 |
artikel |
16 |
A smart admission control and cache replacement approach in content delivery networks
|
Abdo, Lamis |
|
|
27 |
3 |
p. 2427-2445 |
artikel |
17 |
A task allocation schema based on response time optimization in cloud computing
|
Jiang, Zhengtao |
|
|
27 |
3 |
p. 3893-3910 |
artikel |
18 |
Benchmark assessment for the DeepSpeed acceleration library on image classification
|
Liang, Gongbo |
|
|
27 |
3 |
p. 2959-2970 |
artikel |
19 |
Blockchain-based biometric identity management
|
Salem, Sherif Hamdy Gomaa |
|
|
27 |
3 |
p. 3741-3752 |
artikel |
20 |
Blockchain-based optimized edge node selection and privacy preserved framework for federated learning
|
Qammar, Attia |
|
|
27 |
3 |
p. 3203-3218 |
artikel |
21 |
Boosting the visibility of services in microservice architecture
|
Tokmak, Ahmet Vedat |
|
|
27 |
3 |
p. 3099-3111 |
artikel |
22 |
BRIEFBCS: binary robust independent elementary features based fuzzy vault scheme in BCS
|
Kaur, Prabhjot |
|
|
27 |
3 |
p. 3135-3148 |
artikel |
23 |
Cloud security game theory scoring from predation models in simulation
|
Alsup, Damon |
|
|
27 |
3 |
p. 2381-2398 |
artikel |
24 |
Cluster based similarity extraction upon distributed datasets
|
Moustakas, Thanasis |
|
|
27 |
3 |
p. 2917-2929 |
artikel |
25 |
Comparative analysis between a pixel-wise image encryption scheme and AES in a web application context
|
Mokhnache, Abdelaziz |
|
|
27 |
3 |
p. 2971-2982 |
artikel |
26 |
Correction: Improved clustering-based hybrid recommendation system to offer personalized cloud services
|
Nabli, Hajer |
|
|
27 |
3 |
p. 2875 |
artikel |
27 |
Cost-optimized cloud resource management for video streaming: ARIMA predictive approach
|
Darwich, Mahmoud |
|
|
27 |
3 |
p. 3163-3177 |
artikel |
28 |
CPOCEDS-concept preserving online clustering for evolving data streams
|
Jafseer, K. T. |
|
|
27 |
3 |
p. 2983-2998 |
artikel |
29 |
Cybersecurity for autonomous vehicles against malware attacks in smart-cities
|
Aurangzeb, Sana |
|
|
27 |
3 |
p. 3363-3378 |
artikel |
30 |
Decentralized knowledge discovery using massive heterogenous data in Cognitive IoT
|
Jha, Vidyapati |
|
|
27 |
3 |
p. 3657-3682 |
artikel |
31 |
Design and implementation of blockchain-based supply chain framework with improved traceability, privacy, and ownership
|
Mohit, |
|
|
27 |
3 |
p. 2345-2363 |
artikel |
32 |
Design of a distributed offloading and real-time data unified access platform for IoT within command and control communication networks
|
Yang, YiZhuo |
|
|
27 |
3 |
p. 2313-2327 |
artikel |
33 |
Design of the implementation information management platform for distributed generation in distribution network based on information integration
|
Yan, Yuping |
|
|
27 |
3 |
p. 3293-3305 |
artikel |
34 |
Double auction mechanisms in edge computing resource allocation for blockchain networks
|
Xie, Ning |
|
|
27 |
3 |
p. 3017-3035 |
artikel |
35 |
DRDChain: a blockchain-based distributed resource directory for the internet of things
|
Zaghouani, Kheireddine |
|
|
27 |
3 |
p. 3853-3874 |
artikel |
36 |
Effectiveness of machine learning based android malware detectors against adversarial attacks
|
Jyothish, A. |
|
|
27 |
3 |
p. 2549-2569 |
artikel |
37 |
Efficient resource allocation with dynamic traffic arrivals on D2D communication for beyond 5G networks
|
Papachary, Biroju |
|
|
27 |
3 |
p. 2829-2843 |
artikel |
38 |
Energy data classification at the edge: a comparative studyfor energy efficiency applications
|
Alsalemi, Abdullah |
|
|
27 |
3 |
p. 3259-3275 |
artikel |
39 |
Energy efficient power cap configurations through Pareto front analysis and machine learning categorization
|
Cabrera, Alberto |
|
|
27 |
3 |
p. 3433-3449 |
artikel |
40 |
Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach
|
Akbar, Mohd |
|
|
27 |
3 |
p. 3683-3702 |
artikel |
41 |
Exploiting the adaptive neural fuzzy inference system for predicting the effect of notch depth on elastic new strain-concentration factor under combined loading
|
Al-Jarrah, Rami |
|
|
27 |
3 |
p. 3055-3073 |
artikel |
42 |
Factitious or fact? Learning textual representations for fake online review detection
|
Mohawesh, Rami |
|
|
27 |
3 |
p. 3307-3322 |
artikel |
43 |
Federated deep reinforcement learning-based online task offloading and resource allocation in harsh mobile edge computing environment
|
Xiang, Hui |
|
|
27 |
3 |
p. 3323-3339 |
artikel |
44 |
Federated learning for feature-fusion based requirement classification
|
Wang, Ruiwen |
|
|
27 |
3 |
p. 3397-3416 |
artikel |
45 |
Federated learning inspired privacy sensitive emotion recognition based on multi-modal physiological sensors
|
Gahlan, Neha |
|
|
27 |
3 |
p. 3179-3201 |
artikel |
46 |
Hardening of the Internet of Things by using an intrusion detection system based on deep learning
|
Varastan, Bahman |
|
|
27 |
3 |
p. 2465-2488 |
artikel |
47 |
Hilbert curves-based location privacy technique for vehicular cloud networks
|
Al-Balasmeh, Hani |
|
|
27 |
3 |
p. 2489-2504 |
artikel |
48 |
Hybrid artificial immune algorithm for energy-efficient distributed flexible job shop in semiconductor manufacturing
|
Xiaolong, Chen |
|
|
27 |
3 |
p. 3075-3098 |
artikel |
49 |
Hybridhadoop: CPU-GPU hybrid scheduling in hadoop
|
Oh, Chanyoung |
|
|
27 |
3 |
p. 3875-3892 |
artikel |
50 |
IDS-XGbFS: a smart intrusion detection system using XGboostwith recent feature selection for VANET safety
|
Amaouche, Sara |
|
|
27 |
3 |
p. 3521-3535 |
artikel |
51 |
Improved clustering-based hybrid recommendation system to offer personalized cloud services
|
Nabli, Hajer |
|
|
27 |
3 |
p. 2845-2874 |
artikel |
52 |
Intrusion detection based on ensemble learning for big data classification
|
Jemili, Farah |
|
|
27 |
3 |
p. 3771-3798 |
artikel |
53 |
Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM
|
Hanafi, Amir Vafid |
|
|
27 |
3 |
p. 2673-2690 |
artikel |
54 |
I/O-signature-based feature analysis and classification of high-performance computing applications
|
Park, Ju-Won |
|
|
27 |
3 |
p. 3219-3231 |
artikel |
55 |
Large-scale response-aware online ANN search in dynamic datasets
|
Andrade, Guilherme |
|
|
27 |
3 |
p. 3499-3519 |
artikel |
56 |
Lightweight PCB defect detection algorithm based on MSD-YOLO
|
Zhou, Guoao |
|
|
27 |
3 |
p. 3559-3573 |
artikel |
57 |
Low-latency controller load balancing strategy and offloading decision generation algorithm based on lyapunov optimization in SDN mobile edge computing environment
|
Chang, Shuai |
|
|
27 |
3 |
p. 2571-2591 |
artikel |
58 |
Machine learning-based intrusion detection: feature selection versus feature extraction
|
Ngo, Vu-Duc |
|
|
27 |
3 |
p. 2365-2379 |
artikel |
59 |
Mixtran: an efficient and fair scheduler for mixed deep learning workloads in heterogeneous GPU environments
|
Zhang, Xiao |
|
|
27 |
3 |
p. 2775-2784 |
artikel |
60 |
Monitoring and analyzing as a service (MAaaS) through cloud edge based on intelligent transportation applications
|
Souki, Olfa |
|
|
27 |
3 |
p. 3379-3395 |
artikel |
61 |
MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile
|
Li, Shaoyong |
|
|
27 |
3 |
p. 2653-2671 |
artikel |
62 |
Multi-ant colony optimization algorithm based on game strategy and hierarchical temporal memory model
|
Wu, Qihuan |
|
|
27 |
3 |
p. 3113-3133 |
artikel |
63 |
Multi-scale attention graph convolutional recurrent network for traffic forecasting
|
Xiong, Liyan |
|
|
27 |
3 |
p. 3277-3291 |
artikel |
64 |
Multi-stage intrusion detection system aided by grey wolf optimization algorithm
|
Chatterjee, Somnath |
|
|
27 |
3 |
p. 3819-3836 |
artikel |
65 |
Novel hybrid success history intelligent optimizer with Gaussian transformation: application in CNN hyperparameter tuning
|
Fakhouri, Hussam N. |
|
|
27 |
3 |
p. 3717-3739 |
artikel |
66 |
Novel lightweight and fine-grained fast access control using RNS properties in fog computing
|
Alizadeh, Mohammad Ali |
|
|
27 |
3 |
p. 3799-3817 |
artikel |
67 |
Operator placement for data stream processing based on publisher/subscriber in hybrid cloud-fog-edge infrastructure
|
Tang, Bing |
|
|
27 |
3 |
p. 2741-2759 |
artikel |
68 |
Parallel and streaming wavelet neural networks for classification and regression under apache spark
|
Eduru, Harindra Venkatesh |
|
|
27 |
3 |
p. 3451-3469 |
artikel |
69 |
Performance analysis of P2p network content delivery based on queueing model
|
Ma, Zhanyou |
|
|
27 |
3 |
p. 2901-2915 |
artikel |
70 |
pHPCe: a hybrid power conservation approach for containerized HPC environment
|
Kuity, Animesh |
|
|
27 |
3 |
p. 2611-2634 |
artikel |
71 |
Quantification and analysis of performance fluctuation in distributed file system
|
Zhang, Yuchen |
|
|
27 |
3 |
p. 3149-3162 |
artikel |
72 |
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things
|
Goyat, Rekha |
|
|
27 |
3 |
p. 2691-2713 |
artikel |
73 |
RetinaNet-vline: a flexible small target detection algorithm for efficient aggregation of information
|
Liu, Yihong |
|
|
27 |
3 |
p. 2761-2773 |
artikel |
74 |
Secure and energy-efficient data transmission framework for IoT-based healthcare applications using EMCQLR and EKECC
|
Balakrishnan, D. |
|
|
27 |
3 |
p. 2999-3016 |
artikel |
75 |
Secure electronic medical records sharing scheme based on blockchain and quantum key
|
Zhu, Dexin |
|
|
27 |
3 |
p. 3037-3054 |
artikel |
76 |
Secure gene profile data processing using lightweight cryptography and blockchain
|
Mahajan, Hemant |
|
|
27 |
3 |
p. 2785-2803 |
artikel |
77 |
Secure peer-to-peer learning using feature embeddings
|
Kasturi, Anirudh |
|
|
27 |
3 |
p. 3471-3479 |
artikel |
78 |
SEKad: a scalable protocol for blockchain networks with enhanced broadcast efficiency
|
Shen, Tao |
|
|
27 |
3 |
p. 3481-3498 |
artikel |
79 |
Self-adaptive autoscaling algorithm for SLA-sensitive applications running on the Kubernetes clusters
|
Pozdniakova, Olesia |
|
|
27 |
3 |
p. 2399-2426 |
artikel |
80 |
SETL: a transfer learning based dynamic ensemble classifier for concept drift detection in streaming data
|
Arora, Shruti |
|
|
27 |
3 |
p. 3417-3432 |
artikel |
81 |
Software defect prediction using a bidirectional LSTM network combined with oversampling techniques
|
Khleel, Nasraldeen Alnor Adam |
|
|
27 |
3 |
p. 3615-3638 |
artikel |
82 |
Target positioning method based on B-spline level set and GC Yolo-v3
|
Zhang, Lin |
|
|
27 |
3 |
p. 3575-3591 |
artikel |
83 |
The balance of utility, privacy, and trust in network services
|
Wan, Yi |
|
|
27 |
3 |
p. 2931-2946 |
artikel |
84 |
The cellular goore game-based consensus protocol: a cognitive model for blockchain consensus
|
Ameri, Reyhaneh |
|
|
27 |
3 |
p. 2715-2740 |
artikel |
85 |
Utilizing 3D magnetic source imaging with landmark-based features and multi-classification for Alzheimer’s Disease diagnosis
|
Al-Rahayfeh, Amer |
|
|
27 |
3 |
p. 2635-2651 |
artikel |
86 |
YOLO-CEA: a real-time industrial defect detection method based on contextual enhancement and attention
|
Zhao, Shilong |
|
|
27 |
3 |
p. 2329-2344 |
artikel |