nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive node-based botnet detection framework for IoT network
|
Aldaej, Abdulaziz |
|
|
27 |
7 |
p. 9261-9281 |
artikel |
2 |
A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directions
|
Hu, Wengui |
|
|
27 |
7 |
p. 8789-8815 |
artikel |
3 |
Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review
|
Hendaoui, Fatma |
|
|
27 |
7 |
p. 8683-8724 |
artikel |
4 |
Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities
|
Biswas, Sujit |
|
|
27 |
7 |
p. 9395-9414 |
artikel |
5 |
A mean opinion score prediction model for VoIP calls offloading handover from LTE to WiFi
|
Mouhassine, Najib |
|
|
27 |
7 |
p. 9477-9495 |
artikel |
6 |
A metaheuristic approach based on coronavirus herd immunity optimiser for breast cancer diagnosis
|
Hosseinalipour, Ali |
|
|
27 |
7 |
p. 9451-9475 |
artikel |
7 |
An efficient improved exponential distribution optimizer: application to the global, engineering and combinatorial optimization problems
|
Houssein, Essam H. |
|
|
27 |
7 |
p. 9345-9380 |
artikel |
8 |
An efficient partial charging and data gathering strategy using multiple mobile vehicles in wireless rechargeable sensor networks
|
Yadav, Chandra Bhushan Kumar |
|
|
27 |
7 |
p. 8909-8930 |
artikel |
9 |
A new binary chaos-based metaheuristic algorithm for software defect prediction
|
Arasteh, Bahman |
|
|
27 |
7 |
p. 10093-10123 |
artikel |
10 |
An innovative multi-head attention model with BiMGRU for real-time electric vehicle charging management through deep reinforcement learning
|
Mishra, Shivendu |
|
|
27 |
7 |
p. 9993-10023 |
artikel |
11 |
Anomaly detection framework for IoT-enabled appliances using machine learning
|
Siddiqui, Mohd Ahsan |
|
|
27 |
7 |
p. 9811-9835 |
artikel |
12 |
An optimized federated learning method based on soft label grouping for heterogeneous IoT
|
Yang, Yuxin |
|
|
27 |
7 |
p. 8931-8938 |
artikel |
13 |
A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer
|
Elsedimy, E. I. |
|
|
27 |
7 |
p. 9917-9935 |
artikel |
14 |
A privacy preserving quantum authentication scheme for secure data sharing in wireless body area networks
|
Prajapat, Sunil |
|
|
27 |
7 |
p. 9013-9029 |
artikel |
15 |
A relaxed and faster switch migration framework to balance the load of distributed control plane in software defined networks
|
Sikder, Ratul |
|
|
27 |
7 |
p. 8995-9012 |
artikel |
16 |
ARPMEC: an adaptive mobile edge computing-based routing protocol for IoT networks
|
Foko Sindjoung, Miguel Landry |
|
|
27 |
7 |
p. 9435-9450 |
artikel |
17 |
Attention-based ResNet for intrusion detection and severity analysis using sliding window blockchain and firewall in IoT
|
Ntizikira, Ernest |
|
|
27 |
7 |
p. 10025-10051 |
artikel |
18 |
Autonomous UAV-based surveillance system for multi-target detection using reinforcement learning
|
Bany Salameh, Haythem |
|
|
27 |
7 |
p. 9381-9394 |
artikel |
19 |
Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing
|
Akbar, Mohd |
|
|
27 |
7 |
p. 9091-9105 |
artikel |
20 |
Blockchain-based secure and scalable supply chain management system to prevent drug counterfeiting
|
Datta, Sagnik |
|
|
27 |
7 |
p. 9243-9260 |
artikel |
21 |
Cepair: an AI-powered and fog-based predictive CEP system for air quality monitoring
|
Şimsek, Mehmet Ulvi |
|
|
27 |
7 |
p. 9107-9121 |
artikel |
22 |
CLARA: clustered learning automata-based routing algorithm for efficient FANET communication
|
Danesh, Somayeh |
|
|
27 |
7 |
p. 9569-9585 |
artikel |
23 |
Combined economic and emission power dispatch problems through multi-objective Honey Badger optimizer
|
Wang, Fengxian |
|
|
27 |
7 |
p. 9887-9915 |
artikel |
24 |
Compound improved Harris hawks optimization for global and engineering optimization
|
Ouyang, Chengtian |
|
|
27 |
7 |
p. 9509-9568 |
artikel |
25 |
Content caching in mobile edge computing: a survey
|
Khan, Yasar |
|
|
27 |
7 |
p. 8817-8864 |
artikel |
26 |
Correction: Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning
|
Lingayya, Sadananda |
|
|
27 |
7 |
p. 9433 |
artikel |
27 |
CSDANet: a new lightweight fault diagnosis framework towards heavy noise and small samples
|
Xu, Zhao |
|
|
27 |
7 |
p. 9615-9634 |
artikel |
28 |
Data breaches in healthcare: security mechanisms for attack mitigation
|
Nemec Zlatolas, Lili |
|
|
27 |
7 |
p. 8639-8654 |
artikel |
29 |
Deep learning vs. adversarial noise: a battle in malware image analysis
|
Asmitha, K. A. |
|
|
27 |
7 |
p. 9191-9220 |
artikel |
30 |
Design tactics for tailoring transformer architectures to cybersecurity challenges
|
Avci, Cigdem |
|
|
27 |
7 |
p. 9587-9613 |
artikel |
31 |
DFARM: a deadline-aware fault-tolerant scheduler for cloud computing
|
Awan, Ahmad |
|
|
27 |
7 |
p. 9323-9344 |
artikel |
32 |
Drones as a service (DaaS) for 5G networks and blockchain-assisted IoT-based smart city infrastructure
|
Garg, Tanya |
|
|
27 |
7 |
p. 8725-8788 |
artikel |
33 |
Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning
|
Lingayya, Sadananda |
|
|
27 |
7 |
p. 9415-9431 |
artikel |
34 |
Educert-chain: a secure and notarized educational certificate authentication and verification system using permissioned blockchain
|
Rani, Prity |
|
|
27 |
7 |
p. 10169-10196 |
artikel |
35 |
Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs
|
Khalafalla, Wael |
|
|
27 |
7 |
p. 9851-9871 |
artikel |
36 |
Enhanced artificial ecosystem-based optimization for global optimization and constrained engineering problems
|
Wang, Yunpeng |
|
|
27 |
7 |
p. 10053-10092 |
artikel |
37 |
Enhanced time-sensitive networking configuration detection using optimized BPNN with feature selection for industry 4.0
|
Wang, Cheng |
|
|
27 |
7 |
p. 9795-9810 |
artikel |
38 |
Exploring the stochastic patterns of hyperchaotic Lorenz systems with variable fractional order and radial basis function networks
|
Awais, Muhammad |
|
|
27 |
7 |
p. 9031-9064 |
artikel |
39 |
Forest fire monitoring system supported by unmanned aerial vehicles and edge computing: a performance evaluation using petri nets
|
Sabino, Arthur |
|
|
27 |
7 |
p. 9735-9755 |
artikel |
40 |
HCA-YOLO: a non-salient object detection method based on hierarchical attention mechanism
|
Dong, Chengang |
|
|
27 |
7 |
p. 9663-9678 |
artikel |
41 |
Hybrid-grained migration method for load redistribution in heavily-loaded fog nodes
|
Jasim, Mohammed |
|
|
27 |
7 |
p. 9497-9507 |
artikel |
42 |
Hybrid metaheuristic schemes with different configurations and feedback mechanisms for optimal clustering applications
|
Molokomme, Daisy Nkele |
|
|
27 |
7 |
p. 8865-8887 |
artikel |
43 |
Hybrid remora crayfish optimization for engineering and wireless sensor network coverage optimization
|
Zhong, Rui |
|
|
27 |
7 |
p. 10141-10168 |
artikel |
44 |
Innovative combination of covariance analysis-based sliding time window and task-related component analysis for steady-state visual evoked potential recognition
|
Nan, Jiaofen |
|
|
27 |
7 |
p. 10125-10139 |
artikel |
45 |
Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature
|
Saadouni, Rafika |
|
|
27 |
7 |
p. 8655-8681 |
artikel |
46 |
Intrusion detection systems for software-defined networks: a comprehensive study on machine learning-based techniques
|
Mustafa, Zaid |
|
|
27 |
7 |
p. 9635-9661 |
artikel |
47 |
IOTD: intelligent offloading of tasks with deadlines in edge-fog-cloud computing environment using hybrid approach
|
Reddy, Posham Bhargava |
|
|
27 |
7 |
p. 9873-9885 |
artikel |
48 |
Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control
|
Zhang, Kai |
|
|
27 |
7 |
p. 9957-9973 |
artikel |
49 |
LTLBC: a low-latency lightweight block cipher for internet of things
|
Sun, Wei |
|
|
27 |
7 |
p. 9783-9794 |
artikel |
50 |
Multi-class intrusion detection system in SDN based on hybrid BiLSTM model
|
Cui, Meng |
|
|
27 |
7 |
p. 9937-9956 |
artikel |
51 |
Multi-modal Battle Royale optimizer
|
Çiçek, K. Dilşad |
|
|
27 |
7 |
p. 8983-8993 |
artikel |
52 |
Novel hybrid classifier based on fuzzy type-III decision maker and ensemble deep learning model and improved chaos game optimization
|
Mehrabi Hashjin, Nastaran |
|
|
27 |
7 |
p. 10197-10234 |
artikel |
53 |
Optimal analysis in cognitive radio networks with imperfect sensing based on retrial queues with feedback and priority
|
Tian, Ruiling |
|
|
27 |
7 |
p. 9303-9322 |
artikel |
54 |
Particle swarm optimization and fuzzy logic based clustering and routing protocol to enhance lifetime for wireless sensor networks
|
Hu, Huangshui |
|
|
27 |
7 |
p. 9715-9734 |
artikel |
55 |
Performance analysis of P2P network based on differentiated service Geo/Geo/1 + 1 queue
|
Shen, Ying |
|
|
27 |
7 |
p. 9837-9849 |
artikel |
56 |
Reinforcement learning marine predators algorithm for global optimization
|
Wang, Jianlan |
|
|
27 |
7 |
p. 9137-9190 |
artikel |
57 |
Robust intrusion detection for network communication on the Internet of Things: a hybrid machine learning approach
|
Soltani, Nasim |
|
|
27 |
7 |
p. 9975-9991 |
artikel |
58 |
Securing internet of things using machine and deep learning methods: a survey
|
Ghaffari, Ali |
|
|
27 |
7 |
p. 9065-9089 |
artikel |
59 |
Securing multi-client range queries over encrypted data
|
Park, Jae Hwan |
|
|
27 |
7 |
p. 9679-9692 |
artikel |
60 |
ServiceNet: resource-efficient architecture for topology discovery in large-scale multi-tenant clouds
|
Gama Garcia, Angel |
|
|
27 |
7 |
p. 8965-8982 |
artikel |
61 |
SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection
|
Singh, Arjun |
|
|
27 |
7 |
p. 9757-9782 |
artikel |
62 |
Slam loop closure detection algorithm based on MSA-SG
|
Zhang, Heng |
|
|
27 |
7 |
p. 9283-9301 |
artikel |
63 |
STA-former: encoding traffic flows with spatio-temporal associations in transformer networks for prediction
|
Zeng, Hui |
|
|
27 |
7 |
p. 9693-9714 |
artikel |
64 |
StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control
|
Safaee, Shahab |
|
|
27 |
7 |
p. 9221-9241 |
artikel |
65 |
Task scheduling approach in fog and cloud computing using Jellyfish Search (JS) optimizer and Improved Harris Hawks optimization (IHHO) algorithm enhanced by deep learning
|
Jafari, Zahra |
|
|
27 |
7 |
p. 8939-8963 |
artikel |
66 |
TSoptEE: two-stage optimization technique for software development effort estimation
|
Manchala, Pravali |
|
|
27 |
7 |
p. 8889-8908 |
artikel |
67 |
When Fewer Cores Is Faster: A Parametric Study of Undersubscription in High-Performance Computing
|
Prichard, Reid |
|
|
27 |
7 |
p. 9123-9136 |
artikel |