nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A data lake-based security transmission and storage scheme for streaming big data
|
Zhao, Xiaoyan |
|
|
27 |
4 |
p. 4741-4755 |
artikel |
2 |
A distributed load balancing method for IoT/Fog/Cloud environments with volatile resource support
|
Shamsa, Zari |
|
|
27 |
4 |
p. 4281-4320 |
artikel |
3 |
A feature extraction and time warping based neural expansion architecture for cloud resource usage forecasting
|
Singh, Gurjot |
|
|
27 |
4 |
p. 4963-4982 |
artikel |
4 |
A general and modular framework for dark web analysis
|
Ruiz Ródenas, José Manuel |
|
|
27 |
4 |
p. 4687-4703 |
artikel |
5 |
A GNSS UWB tight coupling and IMU ESKF algorithm for indoor and outdoor mixed scenario
|
Luo, Jie |
|
|
27 |
4 |
p. 4855-4865 |
artikel |
6 |
A hybrid approach for fault-tolerance aware load balancing in fog computing
|
Kashyap, Vijaita |
|
|
27 |
4 |
p. 5217-5233 |
artikel |
7 |
A metaheuristic-based task offloading scheme with a trade-off between delay and resource utilization in IoT platform
|
Kumari, Nidhi |
|
|
27 |
4 |
p. 4589-4603 |
artikel |
8 |
An energy-efficient black widow-based adaptive VM placement approach for cloud computing
|
Goyal, Sahul |
|
|
27 |
4 |
p. 4659-4672 |
artikel |
9 |
An ensemble clustering approach for modeling hidden categorization perspectives for cloud workloads
|
Daraghmeh, Mustafa |
|
|
27 |
4 |
p. 4779-4803 |
artikel |
10 |
A non-fungible token (NFT) chain model and performance study
|
Seol, J. |
|
|
27 |
4 |
p. 3927-3944 |
artikel |
11 |
An online ensemble method for auto-scaling NFV-based applications in the edge
|
da Silva, Thiago Pereira |
|
|
27 |
4 |
p. 4255-4279 |
artikel |
12 |
A performance evaluation model for users’ satisfaction in federated clouds
|
Chafai, Zeyneb |
|
|
27 |
4 |
p. 4983-5004 |
artikel |
13 |
A privacy-preserving federated learning framework for blockchain networks
|
Abuzied, Youssif |
|
|
27 |
4 |
p. 3997-4014 |
artikel |
14 |
A scalable blockchain storage scheme for VANET
|
Wei, Wenxiang |
|
|
27 |
4 |
p. 3957-3981 |
artikel |
15 |
A-TSPD: autonomous-two stage algorithm for robust peak detection in online time series
|
Gupta, Aditi |
|
|
27 |
4 |
p. 4063-4076 |
artikel |
16 |
A two-tier multi-objective service placement in container-based fog-cloud computing platforms
|
Dogani, Javad |
|
|
27 |
4 |
p. 4491-4514 |
artikel |
17 |
Benchmarking Micro2Micro transformation: an approach with GNN and VAE
|
Chy, Md Showkat Hossain |
|
|
27 |
4 |
p. 4171-4185 |
artikel |
18 |
Blockchain-driven optimization of IoT in mobile edge computing environment with deep reinforcement learning and multi-criteria decision-making techniques
|
Moghaddasi, Komeil |
|
|
27 |
4 |
p. 4385-4413 |
artikel |
19 |
Cdascaler: a cost-effective dynamic autoscaling approach for containerized microservices
|
Shafi, Numan |
|
|
27 |
4 |
p. 5195-5215 |
artikel |
20 |
CD-TMS: a combinatorial design-based token management system to enhance security and performance in blockchain
|
Hadian, Mohammad |
|
|
27 |
4 |
p. 4515-4536 |
artikel |
21 |
Convergence of the Harris hawks optimization algorithm and fuzzy system for cloud-based task scheduling enhancement
|
Osmanpoor, Mohammad |
|
|
27 |
4 |
p. 4909-4923 |
artikel |
22 |
DAO-LGBM: dual annealing optimization with light gradient boosting machine for advocates prediction in online customer engagement
|
Abu-Salih, Bilal |
|
|
27 |
4 |
p. 5047-5073 |
artikel |
23 |
DDoS attack detection in IoT environment using optimized Elman recurrent neural networks based on chaotic bacterial colony optimization
|
Hussan, M. I. Thariq |
|
|
27 |
4 |
p. 4469-4490 |
artikel |
24 |
DeepLG SecNet: utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments
|
Nanjappan, Manikandan |
|
|
27 |
4 |
p. 5459-5471 |
artikel |
25 |
Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication
|
Kumar, Uddeshaya |
|
|
27 |
4 |
p. 4867-4881 |
artikel |
26 |
Distributed medical data storage model based on blockchain technology
|
Duan, Changyu |
|
|
27 |
4 |
p. 4757-4777 |
artikel |
27 |
DITRA: an efficient event-driven multi-objective optimization algorithm for bandwidth allocation in IoT environments
|
Rouhifar, Mehrin |
|
|
27 |
4 |
p. 5143-5163 |
artikel |
28 |
DNA-chaos governed cryptosystem for cloud-based medical image repository
|
Chidambaram, Nithya |
|
|
27 |
4 |
p. 4127-4144 |
artikel |
29 |
DSLSTM: a deep convolutional encoder–decoder architecture for abnormality detection in video surveillance
|
Roka, Sanjay |
|
|
27 |
4 |
p. 4925-4940 |
artikel |
30 |
Efficient straggler task management in cloud environment using stochastic gradient descent with momentum learning-driven neural networks
|
Swain, Smruti Rekha |
|
|
27 |
4 |
p. 4673-4685 |
artikel |
31 |
Energy-aware parameter tuning for mixed workloads in cloud server
|
Liang, Jiechao |
|
|
27 |
4 |
p. 4805-4821 |
artikel |
32 |
Energy consumption optimization through an intelligent task offloading prediction mechanism in vehicular fog networks
|
Mohammadi, Laya |
|
|
27 |
4 |
p. 4705-4723 |
artikel |
33 |
Energy-efficient aware and predicting bandwidth estimation routing protocol for hybrid communication in wireless body area networks
|
Abdullah, Ako Muhammad |
|
|
27 |
4 |
p. 4187-4206 |
artikel |
34 |
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
|
Atiewi, Saleh |
|
|
27 |
4 |
p. 4551-4568 |
artikel |
35 |
Federated learning analysis for vehicular traffic flow prediction: evaluation of learning algorithms and aggregation approaches
|
Nidhi, |
|
|
27 |
4 |
p. 5075-5091 |
artikel |
36 |
F-EVM: improving routing in Internet of Things using fuzzy MAIRCA approach and fuzzy eigenvector method
|
Mohammadi, Mohammad |
|
|
27 |
4 |
p. 5121-5141 |
artikel |
37 |
Formulating a quality model for cloud-native software architectures: conceptual and methodological considerations
|
Lichtenthäler, Robin |
|
|
27 |
4 |
p. 4077-4093 |
artikel |
38 |
From static code analysis to visual models of microservice architecture
|
Cerny, Tomas |
|
|
27 |
4 |
p. 4145-4170 |
artikel |
39 |
HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach
|
Sivasakthi, D. Adhimuga |
|
|
27 |
4 |
p. 5005-5019 |
artikel |
40 |
Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm
|
Hussain, Muhammad |
|
|
27 |
4 |
p. 5355-5376 |
artikel |
41 |
Improving fault tolerance in LinuX container-based distributed systems using blockchain
|
Farahmandian, Masoum |
|
|
27 |
4 |
p. 5285-5294 |
artikel |
42 |
IoT data management for caching performance improvement in NDN
|
Zahedinia, Marzieh Sadat |
|
|
27 |
4 |
p. 4537-4550 |
artikel |
43 |
K-LionER: meta-heuristic approach for energy efficient cluster based routing for WSN-assisted IoT networks
|
Rekha, |
|
|
27 |
4 |
p. 4207-4221 |
artikel |
44 |
Machine learning-driven energy-efficient load balancing for real-time heterogeneous systems
|
Rahmani, Taha Abdelazziz |
|
|
27 |
4 |
p. 4883-4908 |
artikel |
45 |
Microservices enabled bidirectional fault-tolerance scheme for healthcare internet of things
|
Maray, Mohammed |
|
|
27 |
4 |
p. 4621-4633 |
artikel |
46 |
Modeling the Green Cloud Continuum: integrating energy considerations into Cloud–Edge models
|
Patel, Yashwant Singh |
|
|
27 |
4 |
p. 4095-4125 |
artikel |
47 |
Multi-objective intelligent clustering routing schema for internet of things enabled wireless sensor networks using deep reinforcement learning
|
Ghamry, Walid K. |
|
|
27 |
4 |
p. 4941-4961 |
artikel |
48 |
Multi-strategy improved sparrow search algorithm for job shop scheduling problem
|
Li, Zhengfeng |
|
|
27 |
4 |
p. 4605-4619 |
artikel |
49 |
Neural emulator for nonlinear systems based on PSO algorithm: real-time validation
|
Farhat, Yassin |
|
|
27 |
4 |
p. 5107-5119 |
artikel |
50 |
Optimizing electric vehicle routing with nonlinear charging and time windows using improved differential evolution algorithm
|
Deng, Jiawen |
|
|
27 |
4 |
p. 5423-5458 |
artikel |
51 |
OsCoMIT: Osmotic computing-based service management for intelligent transportation systems in 5G network
|
Kaur, Akashdeep |
|
|
27 |
4 |
p. 5403-5421 |
artikel |
52 |
Persona preserving reputation protocol (P2RP) for enhanced security, privacy, and trust in blockchain oracles
|
You, Shengwei |
|
|
27 |
4 |
p. 3945-3956 |
artikel |
53 |
Preserving flow table integrity in OpenFlow networks through smart contract
|
Bargayary, Birglang |
|
|
27 |
4 |
p. 4569-4588 |
artikel |
54 |
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities
|
Goyat, Rekha |
|
|
27 |
4 |
p. 4823-4839 |
artikel |
55 |
Privacy-preserving image retrieval based on additive secret sharing in cloud environment
|
Zhang, Bo |
|
|
27 |
4 |
p. 5021-5045 |
artikel |
56 |
Puma optimizer (PO): a novel metaheuristic optimization algorithm and its application in machine learning
|
Abdollahzadeh, Benyamin |
|
|
27 |
4 |
p. 5235-5283 |
artikel |
57 |
Refining differential evolution with mutation rate and neighborhood weight local search
|
Sun, Lisheng |
|
|
27 |
4 |
p. 4361-4384 |
artikel |
58 |
Resource allocation and aging priority-based scheduling of linear workflow applications with transient failures and selective imprecise computations
|
Karatza, Helen D. |
|
|
27 |
4 |
p. 5473-5488 |
artikel |
59 |
RESTBERTa: a Transformer-based question answering approach for semantic search in Web API documentation
|
Kotstein, Sebastian |
|
|
27 |
4 |
p. 4035-4061 |
artikel |
60 |
RM-RPL: reliable mobility management framework for RPL-based IoT systems
|
Seyfollahi, Ali |
|
|
27 |
4 |
p. 4449-4468 |
artikel |
61 |
Robust medical and color image cryptosystem using array index and chaotic S-box
|
Podder, Durgabati |
|
|
27 |
4 |
p. 4321-4346 |
artikel |
62 |
Scalability meets regulation: UTXO-based sharding and zero-knowledge proofs for regulated digital currencies
|
Jin, Si Yuan |
|
|
27 |
4 |
p. 3983-3996 |
artikel |
63 |
Secure and efficient decentralized machine learning through group-based model aggregation
|
Mosqueda González, Brandon A. |
|
|
27 |
4 |
p. 3911-3925 |
artikel |
64 |
SEVCOD: secure and efficient verifiable computation on outsourced data
|
Chakraborty, Partha Sarathi |
|
|
27 |
4 |
p. 4725-4739 |
artikel |
65 |
Sg: Automated tuning algorithm for storage systems based on simulated environments and group climbing
|
Zhang, Yuchen |
|
|
27 |
4 |
p. 4841-4853 |
artikel |
66 |
Shortest node-to-node disjoint paths algorithm for symmetric networks
|
AlMansouri, Hesham |
|
|
27 |
4 |
p. 4347-4360 |
artikel |
67 |
Sine Cosine Embedded Squirrel Search Algorithm for Global Optimization and Engineering Design
|
Zeng, Liang |
|
|
27 |
4 |
p. 4415-4448 |
artikel |
68 |
Streaming traffic classification: a hybrid deep learning and big data approach
|
Seydali, Mehdi |
|
|
27 |
4 |
p. 5165-5193 |
artikel |
69 |
Test suite assessment of safety-critical systems using safety tactics and fault-based mutation testing
|
Gurbuz, Havva Gulay |
|
|
27 |
4 |
p. 5377-5401 |
artikel |
70 |
Towards an IPFS-based highly scalable blockchain for PEV charging and achieve near super-stability in a V2V environment
|
Choubey, Anurag |
|
|
27 |
4 |
p. 5295-5336 |
artikel |
71 |
Towards establishing intelligent multi-domain edge orchestration for highly distributed immersive services: a virtual touring use case
|
Benmerar, Tarik Zakaria |
|
|
27 |
4 |
p. 4223-4253 |
artikel |
72 |
Towards maintaining confidentiality and anonymity in secure blockchain-based e-voting
|
Abed, Husni |
|
|
27 |
4 |
p. 4635-4657 |
artikel |
73 |
Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency
|
Hossain Faruk, Md Jobair |
|
|
27 |
4 |
p. 4015-4034 |
artikel |
74 |
Uncertainty Level-Based Algorithms by Managing Renewable Energy for Geo-Distributed Datacenters
|
Padhi, Slokashree |
|
|
27 |
4 |
p. 5337-5354 |
artikel |
75 |
Use of edge resources for DNN model maintenance in 5G IoT networks
|
Sung, Jungwoong |
|
|
27 |
4 |
p. 5093-5105 |
artikel |