nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive hyperledger fabric performance evaluation based on resources capacity planning
|
Melo, Carlos |
|
|
27 |
9 |
p. 12395-12410 |
artikel |
2 |
A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks
|
Jain, Ankit Kumar |
|
|
27 |
9 |
p. 13129-13164 |
artikel |
3 |
Adaptive spatio-temporal graph convolutional network with attention mechanism for mobile edge network traffic prediction
|
Sha, Ning |
|
|
27 |
9 |
p. 13257-13272 |
artikel |
4 |
Advanced cost-aware Max–Min workflow tasks allocation and scheduling in cloud computing systems
|
Raeisi-Varzaneh, Mostafa |
|
|
27 |
9 |
p. 13407-13419 |
artikel |
5 |
A faster deep graph clustering network based on dynamic graph weight update mechanism
|
Li, Xin |
|
|
27 |
9 |
p. 12123-12140 |
artikel |
6 |
A hybrid deep learning based enhanced and reliable approach for VANET intrusion detection system
|
Barve, Atul |
|
|
27 |
9 |
p. 11839-11850 |
artikel |
7 |
A hybrid northern goshawk optimization algorithm based on cluster collaboration
|
Wu, Changjun |
|
|
27 |
9 |
p. 13203-13237 |
artikel |
8 |
An authentication mechanism based on blockchain for IoT environment
|
Zargar, Gholam Reza |
|
|
27 |
9 |
p. 13239-13255 |
artikel |
9 |
Android malware detection using time-aware machine learning approach
|
AlSobeh, Anas M. R. |
|
|
27 |
9 |
p. 12627-12648 |
artikel |
10 |
An effective classification using enhanced elephant herding optimization with convolution neural network for intrusion detection in IoMT architecture
|
Praveena Anjelin, D. |
|
|
27 |
9 |
p. 12341-12359 |
artikel |
11 |
An effective multiclass skin cancer classification approach based on deep convolutional neural network
|
Houssein, Essam H. |
|
|
27 |
9 |
p. 12799-12819 |
artikel |
12 |
An effective partition-based framework for virtual machine migration in cloud services
|
Luo, Liji |
|
|
27 |
9 |
p. 12899-12917 |
artikel |
13 |
An improved density peaks clustering algorithm using similarity assignment strategy with K-nearest neighbors
|
Hu, Wei |
|
|
27 |
9 |
p. 12689-12706 |
artikel |
14 |
An improved Tasmanian devil optimization algorithm based on sine-cosine strategy with dynamic weighting factors
|
Zhang, Huanlong |
|
|
27 |
9 |
p. 12875-12897 |
artikel |
15 |
A novel evolutionary status guided hyper-heuristic algorithm for continuous optimization
|
Zhong, Rui |
|
|
27 |
9 |
p. 12209-12238 |
artikel |
16 |
A novel hybrid Artificial Gorilla Troops Optimizer with Honey Badger Algorithm for solving cloud scheduling problem
|
Hussien, Abdelazim G. |
|
|
27 |
9 |
p. 13093-13128 |
artikel |
17 |
A novel real-time object detection method for complex road scenes based on YOLOv7-tiny
|
Li, Yunfa |
|
|
27 |
9 |
p. 13379-13393 |
artikel |
18 |
A novel software defect prediction model using two-phase grey wolf optimisation for feature selection
|
Malhotra, Ruchika |
|
|
27 |
9 |
p. 12185-12207 |
artikel |
19 |
A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection
|
Lin, Yongxing |
|
|
27 |
9 |
p. 13333-13352 |
artikel |
20 |
A two-way trust routing scheme to improve security in fog computing environment
|
Wang, Jun |
|
|
27 |
9 |
p. 13165-13185 |
artikel |
21 |
Automatic diagnosis of myopic maculopathy using continuous severity ranking labels
|
Sun, Yun |
|
|
27 |
9 |
p. 12669-12688 |
artikel |
22 |
Black eagle optimizer: a metaheuristic optimization method for solving engineering optimization problems
|
Zhang, Haobin |
|
|
27 |
9 |
p. 12361-12393 |
artikel |
23 |
Blockchain cross-chain protocol based on improved hashed time-locked contract
|
Li, Jiao |
|
|
27 |
9 |
p. 12007-12027 |
artikel |
24 |
Catch fish optimization algorithm: a new human behavior algorithm for solving clustering problems
|
Jia, Heming |
|
|
27 |
9 |
p. 13295-13332 |
artikel |
25 |
Causal network construction based on KICA-ECCM for root cause diagnosis of industrial processes
|
He, Yayin |
|
|
27 |
9 |
p. 11891-11909 |
artikel |
26 |
Chaos-BBO: Chaos balanced butterfly optimizer with dynamic continuum chaotic strategies and its applications
|
Zhang, Mengjian |
|
|
27 |
9 |
p. 11911-11952 |
artikel |
27 |
CloudAIBus: a testbed for AI based cloud computing environments
|
Velu, Sasidharan |
|
|
27 |
9 |
p. 11953-11981 |
artikel |
28 |
Connecting the dots between stance and fake news detection with blockchain, proof of reputation, and the Hoeffding bound
|
Salah, Ilhem |
|
|
27 |
9 |
p. 13395-13405 |
artikel |
29 |
Correction: Efficient integer division computation protocols based on partial homomorphic encryption
|
Sun, Yuhong |
|
|
27 |
9 |
p. 12103 |
artikel |
30 |
DEA2H2: differential evolution architecture based adaptive hyper-heuristic algorithm for continuous optimization
|
Zhong, Rui |
|
|
27 |
9 |
p. 12239-12266 |
artikel |
31 |
Designing quantum-secure attribute-based encryption
|
Rao, Y. Sreenivasa |
|
|
27 |
9 |
p. 13075-13091 |
artikel |
32 |
DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN
|
Rajasekar, V. R. |
|
|
27 |
9 |
p. 12029-12068 |
artikel |
33 |
DyPoA: enhanced PoA protocol with a dynamic set of validators for IoT
|
Wu, Xiaohua |
|
|
27 |
9 |
p. 12527-12545 |
artikel |
34 |
Eel and grouper optimizer: a nature-inspired optimization algorithm
|
Mohammadzadeh, Ali |
|
|
27 |
9 |
p. 12745-12786 |
artikel |
35 |
Efficient integer division computation protocols based on partial homomorphic encryption
|
Sun, Yuhong |
|
|
27 |
9 |
p. 12091-12102 |
artikel |
36 |
Energy-efficient buildings with energy-efficient optimized models: a case study on thermal bridge detection
|
Fişne, Alparslan |
|
|
27 |
9 |
p. 12787-12797 |
artikel |
37 |
Energy-efficient communication-aware VM placement in cloud datacenter using hybrid ACO–GWO
|
Keshri, Rashmi |
|
|
27 |
9 |
p. 13047-13074 |
artikel |
38 |
Enhanced K-NN with Bayesian optimization algorithm for predicting energy efficiency of smart grids in IoT
|
Zhao, Wenlong |
|
|
27 |
9 |
p. 12311-12322 |
artikel |
39 |
Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism
|
Kandoussi, El Mehdi |
|
|
27 |
9 |
p. 12509-12526 |
artikel |
40 |
Enhancing data authentication in software-defined networking (SDN) using multiparty computation
|
Hendaoui, Fatma |
|
|
27 |
9 |
p. 12649-12668 |
artikel |
41 |
Enhancing network security with information-guided-enhanced Runge Kutta feature selection for intrusion detection
|
Yuan, Li |
|
|
27 |
9 |
p. 12569-12602 |
artikel |
42 |
Enhancing resource utilization and privacy in IoT data placement through fuzzy logic and PSO optimization
|
Dhanushkodi, Kavitha |
|
|
27 |
9 |
p. 12603-12626 |
artikel |
43 |
Extending parallel programming patterns with adaptability features
|
Galante, Guilherme |
|
|
27 |
9 |
p. 12547-12568 |
artikel |
44 |
Gene-targeting multiplayer battle game optimizer for large-scale global optimization via cooperative coevolution
|
Zhong, Rui |
|
|
27 |
9 |
p. 12483-12508 |
artikel |
45 |
HOGWO: a fog inspired optimized load balancing approach using hybridized grey wolf algorithm
|
Das, Debashreet |
|
|
27 |
9 |
p. 13273-13294 |
artikel |
46 |
Hybrid metaheuristics for selective inference task offloading under time and energy constraints for real-time IoT sensing systems
|
Ben Sada, Abdelkarim |
|
|
27 |
9 |
p. 12965-12981 |
artikel |
47 |
Improved aquila optimizer with mRMR for feature selection of high-dimensional gene expression data
|
Qin, Xiwen |
|
|
27 |
9 |
p. 13005-13027 |
artikel |
48 |
Lightweight secure authentication protocol for automatic dependent surveillance broadcast system
|
Sher, Burhan |
|
|
27 |
9 |
p. 12267-12282 |
artikel |
49 |
Machine learning driven four-elements high gain MIMO antenna for wireless connectivity
|
Agrawal, Krishna Kant |
|
|
27 |
9 |
p. 12707-12725 |
artikel |
50 |
MDA-YOLO Person: a 2D human pose estimation model based on YOLO detection framework
|
Dong, Chengang |
|
|
27 |
9 |
p. 12323-12340 |
artikel |
51 |
Modeling and verification of software evolution using bigraphical reactive system
|
Pal, Nisha |
|
|
27 |
9 |
p. 12983-13003 |
artikel |
52 |
Modified clustering and incentivized stable CH selection for reliable VANET communication
|
Kumari, Ashish |
|
|
27 |
9 |
p. 11983-12005 |
artikel |
53 |
OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things
|
Al-Amiedy, Taief Alaa |
|
|
27 |
9 |
p. 12141-12184 |
artikel |
54 |
OptFBFN: IOT threat mitigation in software-defined networks based on fuzzy approach
|
Dhanalaxmi, B. |
|
|
27 |
9 |
p. 12943-12963 |
artikel |
55 |
Optimal power scheduling of microgrid considering renewable sources and demand response management
|
Srivastava, Abhishek |
|
|
27 |
9 |
p. 11851-11872 |
artikel |
56 |
PPFLV: privacy-preserving federated learning with verifiability
|
Zhou, Qun |
|
|
27 |
9 |
p. 12727-12743 |
artikel |
57 |
Quantum competitive decision algorithm for the emergency siting problem under given deadline conditions
|
Zhao, Wei |
|
|
27 |
9 |
p. 13029-13046 |
artikel |
58 |
RAPTS: resource aware prioritized task scheduling technique in heterogeneous fog computing environment
|
Hussain, Mazhar |
|
|
27 |
9 |
p. 13353-13377 |
artikel |
59 |
Res2Net-ERNN: deep learning based cyberattack classification in software defined network
|
Maddu, Mamatha |
|
|
27 |
9 |
p. 12821-12839 |
artikel |
60 |
Revolutionizing agri-food supply chain management with blockchain-based traceability and navigation integration
|
Aggarwal, Manoj |
|
|
27 |
9 |
p. 12919-12942 |
artikel |
61 |
SCIDP–Secure cloud-integrated data dissemination protocol for efficient reprogramming in internet of things
|
Shanmugapriya, R. |
|
|
27 |
9 |
p. 12841-12860 |
artikel |
62 |
SCRUB: a novel energy-efficient virtual machines selection and migration scheme in cloud data centers
|
Yekta, Mohammad |
|
|
27 |
9 |
p. 12861-12874 |
artikel |
63 |
Secure and efficient content-based image retrieval using dominant local patterns and watermark encryption in cloud computing
|
Sucharitha, G. |
|
|
27 |
9 |
p. 11873-11889 |
artikel |
64 |
Soft computing approaches for dynamic multi-objective evaluation of computational offloading: a literature review
|
Khan, Sheharyar |
|
|
27 |
9 |
p. 12459-12481 |
artikel |
65 |
STTD: spatial-temporal transformer with double recurrent graph convolutional cooperative network for traffic flow prediction
|
Zeng, Hui |
|
|
27 |
9 |
p. 12069-12089 |
artikel |
66 |
Task scheduling in cloud computing systems using honey badger algorithm with improved density factor and foucault pendulum motion
|
Zhang, Si-Wen |
|
|
27 |
9 |
p. 12411-12457 |
artikel |
67 |
Three-party evolutionary game-based analysis and stability enhancement of improved PBFT consensus mechanism
|
Wang, Feifan |
|
|
27 |
9 |
p. 12283-12309 |
artikel |
68 |
Time-limited ownership delegation scheme with revocation security for healthcare
|
Zhao, Xiaoping |
|
|
27 |
9 |
p. 12105-12121 |
artikel |
69 |
Unmanned aerial vehicle assisted communication: applications, challenges, and future outlook
|
Li, Yilin |
|
|
27 |
9 |
p. 13187-13202 |
artikel |