Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             67 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive node-based botnet detection framework for IoT network Aldaej, Abdulaziz

27 7 p. 9261-9281
artikel
2 A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directions Hu, Wengui

27 7 p. 8789-8815
artikel
3 Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review Hendaoui, Fatma

27 7 p. 8683-8724
artikel
4 Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities Biswas, Sujit

27 7 p. 9395-9414
artikel
5 A mean opinion score prediction model for VoIP calls offloading handover from LTE to WiFi Mouhassine, Najib

27 7 p. 9477-9495
artikel
6 A metaheuristic approach based on coronavirus herd immunity optimiser for breast cancer diagnosis Hosseinalipour, Ali

27 7 p. 9451-9475
artikel
7 An efficient improved exponential distribution optimizer: application to the global, engineering and combinatorial optimization problems Houssein, Essam H.

27 7 p. 9345-9380
artikel
8 An efficient partial charging and data gathering strategy using multiple mobile vehicles in wireless rechargeable sensor networks Yadav, Chandra Bhushan Kumar

27 7 p. 8909-8930
artikel
9 A new binary chaos-based metaheuristic algorithm for software defect prediction Arasteh, Bahman

27 7 p. 10093-10123
artikel
10 An innovative multi-head attention model with BiMGRU for real-time electric vehicle charging management through deep reinforcement learning Mishra, Shivendu

27 7 p. 9993-10023
artikel
11 Anomaly detection framework for IoT-enabled appliances using machine learning Siddiqui, Mohd Ahsan

27 7 p. 9811-9835
artikel
12 An optimized federated learning method based on soft label grouping for heterogeneous IoT Yang, Yuxin

27 7 p. 8931-8938
artikel
13 A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer Elsedimy, E. I.

27 7 p. 9917-9935
artikel
14 A privacy preserving quantum authentication scheme for secure data sharing in wireless body area networks Prajapat, Sunil

27 7 p. 9013-9029
artikel
15 A relaxed and faster switch migration framework to balance the load of distributed control plane in software defined networks Sikder, Ratul

27 7 p. 8995-9012
artikel
16 ARPMEC: an adaptive mobile edge computing-based routing protocol for IoT networks Foko Sindjoung, Miguel Landry

27 7 p. 9435-9450
artikel
17 Attention-based ResNet for intrusion detection and severity analysis using sliding window blockchain and firewall in IoT Ntizikira, Ernest

27 7 p. 10025-10051
artikel
18 Autonomous UAV-based surveillance system for multi-target detection using reinforcement learning Bany Salameh, Haythem

27 7 p. 9381-9394
artikel
19 Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing Akbar, Mohd

27 7 p. 9091-9105
artikel
20 Blockchain-based secure and scalable supply chain management system to prevent drug counterfeiting Datta, Sagnik

27 7 p. 9243-9260
artikel
21 Cepair: an AI-powered and fog-based predictive CEP system for air quality monitoring Şimsek, Mehmet Ulvi

27 7 p. 9107-9121
artikel
22 CLARA: clustered learning automata-based routing algorithm for efficient FANET communication Danesh, Somayeh

27 7 p. 9569-9585
artikel
23 Combined economic and emission power dispatch problems through multi-objective Honey Badger optimizer Wang, Fengxian

27 7 p. 9887-9915
artikel
24 Compound improved Harris hawks optimization for global and engineering optimization Ouyang, Chengtian

27 7 p. 9509-9568
artikel
25 Content caching in mobile edge computing: a survey Khan, Yasar

27 7 p. 8817-8864
artikel
26 Correction: Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning Lingayya, Sadananda

27 7 p. 9433
artikel
27 CSDANet: a new lightweight fault diagnosis framework towards heavy noise and small samples Xu, Zhao

27 7 p. 9615-9634
artikel
28 Data breaches in healthcare: security mechanisms for attack mitigation Nemec Zlatolas, Lili

27 7 p. 8639-8654
artikel
29 Deep learning vs. adversarial noise: a battle in malware image analysis Asmitha, K. A.

27 7 p. 9191-9220
artikel
30 Design tactics for tailoring transformer architectures to cybersecurity challenges Avci, Cigdem

27 7 p. 9587-9613
artikel
31 DFARM: a deadline-aware fault-tolerant scheduler for cloud computing Awan, Ahmad

27 7 p. 9323-9344
artikel
32 Drones as a service (DaaS) for 5G networks and blockchain-assisted IoT-based smart city infrastructure Garg, Tanya

27 7 p. 8725-8788
artikel
33 Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning Lingayya, Sadananda

27 7 p. 9415-9431
artikel
34 Educert-chain: a secure and notarized educational certificate authentication and verification system using permissioned blockchain Rani, Prity

27 7 p. 10169-10196
artikel
35 Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs Khalafalla, Wael

27 7 p. 9851-9871
artikel
36 Enhanced artificial ecosystem-based optimization for global optimization and constrained engineering problems Wang, Yunpeng

27 7 p. 10053-10092
artikel
37 Enhanced time-sensitive networking configuration detection using optimized BPNN with feature selection for industry 4.0 Wang, Cheng

27 7 p. 9795-9810
artikel
38 Exploring the stochastic patterns of hyperchaotic Lorenz systems with variable fractional order and radial basis function networks Awais, Muhammad

27 7 p. 9031-9064
artikel
39 Forest fire monitoring system supported by unmanned aerial vehicles and edge computing: a performance evaluation using petri nets Sabino, Arthur

27 7 p. 9735-9755
artikel
40 HCA-YOLO: a non-salient object detection method based on hierarchical attention mechanism Dong, Chengang

27 7 p. 9663-9678
artikel
41 Hybrid-grained migration method for load redistribution in heavily-loaded fog nodes Jasim, Mohammed

27 7 p. 9497-9507
artikel
42 Hybrid metaheuristic schemes with different configurations and feedback mechanisms for optimal clustering applications Molokomme, Daisy Nkele

27 7 p. 8865-8887
artikel
43 Hybrid remora crayfish optimization for engineering and wireless sensor network coverage optimization Zhong, Rui

27 7 p. 10141-10168
artikel
44 Innovative combination of covariance analysis-based sliding time window and task-related component analysis for steady-state visual evoked potential recognition Nan, Jiaofen

27 7 p. 10125-10139
artikel
45 Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature Saadouni, Rafika

27 7 p. 8655-8681
artikel
46 Intrusion detection systems for software-defined networks: a comprehensive study on machine learning-based techniques Mustafa, Zaid

27 7 p. 9635-9661
artikel
47 IOTD: intelligent offloading of tasks with deadlines in edge-fog-cloud computing environment using hybrid approach Reddy, Posham Bhargava

27 7 p. 9873-9885
artikel
48 Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control Zhang, Kai

27 7 p. 9957-9973
artikel
49 LTLBC: a low-latency lightweight block cipher for internet of things Sun, Wei

27 7 p. 9783-9794
artikel
50 Multi-class intrusion detection system in SDN based on hybrid BiLSTM model Cui, Meng

27 7 p. 9937-9956
artikel
51 Multi-modal Battle Royale optimizer Çiçek, K. Dilşad

27 7 p. 8983-8993
artikel
52 Novel hybrid classifier based on fuzzy type-III decision maker and ensemble deep learning model and improved chaos game optimization Mehrabi Hashjin, Nastaran

27 7 p. 10197-10234
artikel
53 Optimal analysis in cognitive radio networks with imperfect sensing based on retrial queues with feedback and priority Tian, Ruiling

27 7 p. 9303-9322
artikel
54 Particle swarm optimization and fuzzy logic based clustering and routing protocol to enhance lifetime for wireless sensor networks Hu, Huangshui

27 7 p. 9715-9734
artikel
55 Performance analysis of P2P network based on differentiated service Geo/Geo/1 + 1 queue Shen, Ying

27 7 p. 9837-9849
artikel
56 Reinforcement learning marine predators algorithm for global optimization Wang, Jianlan

27 7 p. 9137-9190
artikel
57 Robust intrusion detection for network communication on the Internet of Things: a hybrid machine learning approach Soltani, Nasim

27 7 p. 9975-9991
artikel
58 Securing internet of things using machine and deep learning methods: a survey Ghaffari, Ali

27 7 p. 9065-9089
artikel
59 Securing multi-client range queries over encrypted data Park, Jae Hwan

27 7 p. 9679-9692
artikel
60 ServiceNet: resource-efficient architecture for topology discovery in large-scale multi-tenant clouds Gama Garcia, Angel

27 7 p. 8965-8982
artikel
61 SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection Singh, Arjun

27 7 p. 9757-9782
artikel
62 Slam loop closure detection algorithm based on MSA-SG Zhang, Heng

27 7 p. 9283-9301
artikel
63 STA-former: encoding traffic flows with spatio-temporal associations in transformer networks for prediction Zeng, Hui

27 7 p. 9693-9714
artikel
64 StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control Safaee, Shahab

27 7 p. 9221-9241
artikel
65 Task scheduling approach in fog and cloud computing using Jellyfish Search (JS) optimizer and Improved Harris Hawks optimization (IHHO) algorithm enhanced by deep learning Jafari, Zahra

27 7 p. 8939-8963
artikel
66 TSoptEE: two-stage optimization technique for software development effort estimation Manchala, Pravali

27 7 p. 8889-8908
artikel
67 When Fewer Cores Is Faster: A Parametric Study of Undersubscription in High-Performance Computing Prichard, Reid

27 7 p. 9123-9136
artikel
                             67 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland