Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             69 results found
no title author magazine year volume issue page(s) type
1 A comprehensive hyperledger fabric performance evaluation based on resources capacity planning Melo, Carlos

27 9 p. 12395-12410
article
2 A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks Jain, Ankit Kumar

27 9 p. 13129-13164
article
3 Adaptive spatio-temporal graph convolutional network with attention mechanism for mobile edge network traffic prediction Sha, Ning

27 9 p. 13257-13272
article
4 Advanced cost-aware Max–Min workflow tasks allocation and scheduling in cloud computing systems Raeisi-Varzaneh, Mostafa

27 9 p. 13407-13419
article
5 A faster deep graph clustering network based on dynamic graph weight update mechanism Li, Xin

27 9 p. 12123-12140
article
6 A hybrid deep learning based enhanced and reliable approach for VANET intrusion detection system Barve, Atul

27 9 p. 11839-11850
article
7 A hybrid northern goshawk optimization algorithm based on cluster collaboration Wu, Changjun

27 9 p. 13203-13237
article
8 An authentication mechanism based on blockchain for IoT environment Zargar, Gholam Reza

27 9 p. 13239-13255
article
9 Android malware detection using time-aware machine learning approach AlSobeh, Anas M. R.

27 9 p. 12627-12648
article
10 An effective classification using enhanced elephant herding optimization with convolution neural network for intrusion detection in IoMT architecture Praveena Anjelin, D.

27 9 p. 12341-12359
article
11 An effective multiclass skin cancer classification approach based on deep convolutional neural network Houssein, Essam H.

27 9 p. 12799-12819
article
12 An effective partition-based framework for virtual machine migration in cloud services Luo, Liji

27 9 p. 12899-12917
article
13 An improved density peaks clustering algorithm using similarity assignment strategy with K-nearest neighbors Hu, Wei

27 9 p. 12689-12706
article
14 An improved Tasmanian devil optimization algorithm based on sine-cosine strategy with dynamic weighting factors Zhang, Huanlong

27 9 p. 12875-12897
article
15 A novel evolutionary status guided hyper-heuristic algorithm for continuous optimization Zhong, Rui

27 9 p. 12209-12238
article
16 A novel hybrid Artificial Gorilla Troops Optimizer with Honey Badger Algorithm for solving cloud scheduling problem Hussien, Abdelazim G.

27 9 p. 13093-13128
article
17 A novel real-time object detection method for complex road scenes based on YOLOv7-tiny Li, Yunfa

27 9 p. 13379-13393
article
18 A novel software defect prediction model using two-phase grey wolf optimisation for feature selection Malhotra, Ruchika

27 9 p. 12185-12207
article
19 A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection Lin, Yongxing

27 9 p. 13333-13352
article
20 A two-way trust routing scheme to improve security in fog computing environment Wang, Jun

27 9 p. 13165-13185
article
21 Automatic diagnosis of myopic maculopathy using continuous severity ranking labels Sun, Yun

27 9 p. 12669-12688
article
22 Black eagle optimizer: a metaheuristic optimization method for solving engineering optimization problems Zhang, Haobin

27 9 p. 12361-12393
article
23 Blockchain cross-chain protocol based on improved hashed time-locked contract Li, Jiao

27 9 p. 12007-12027
article
24 Catch fish optimization algorithm: a new human behavior algorithm for solving clustering problems Jia, Heming

27 9 p. 13295-13332
article
25 Causal network construction based on KICA-ECCM for root cause diagnosis of industrial processes He, Yayin

27 9 p. 11891-11909
article
26 Chaos-BBO: Chaos balanced butterfly optimizer with dynamic continuum chaotic strategies and its applications Zhang, Mengjian

27 9 p. 11911-11952
article
27 CloudAIBus: a testbed for AI based cloud computing environments Velu, Sasidharan

27 9 p. 11953-11981
article
28 Connecting the dots between stance and fake news detection with blockchain, proof of reputation, and the Hoeffding bound Salah, Ilhem

27 9 p. 13395-13405
article
29 Correction: Efficient integer division computation protocols based on partial homomorphic encryption Sun, Yuhong

27 9 p. 12103
article
30 DEA2H2: differential evolution architecture based adaptive hyper-heuristic algorithm for continuous optimization Zhong, Rui

27 9 p. 12239-12266
article
31 Designing quantum-secure attribute-based encryption Rao, Y. Sreenivasa

27 9 p. 13075-13091
article
32 DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN Rajasekar, V. R.

27 9 p. 12029-12068
article
33 DyPoA: enhanced PoA protocol with a dynamic set of validators for IoT Wu, Xiaohua

27 9 p. 12527-12545
article
34 Eel and grouper optimizer: a nature-inspired optimization algorithm Mohammadzadeh, Ali

27 9 p. 12745-12786
article
35 Efficient integer division computation protocols based on partial homomorphic encryption Sun, Yuhong

27 9 p. 12091-12102
article
36 Energy-efficient buildings with energy-efficient optimized models: a case study on thermal bridge detection Fişne, Alparslan

27 9 p. 12787-12797
article
37 Energy-efficient communication-aware VM placement in cloud datacenter using hybrid ACO–GWO Keshri, Rashmi

27 9 p. 13047-13074
article
38 Enhanced K-NN with Bayesian optimization algorithm for predicting energy efficiency of smart grids in IoT Zhao, Wenlong

27 9 p. 12311-12322
article
39 Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism Kandoussi, El Mehdi

27 9 p. 12509-12526
article
40 Enhancing data authentication in software-defined networking (SDN) using multiparty computation Hendaoui, Fatma

27 9 p. 12649-12668
article
41 Enhancing network security with information-guided-enhanced Runge Kutta feature selection for intrusion detection Yuan, Li

27 9 p. 12569-12602
article
42 Enhancing resource utilization and privacy in IoT data placement through fuzzy logic and PSO optimization Dhanushkodi, Kavitha

27 9 p. 12603-12626
article
43 Extending parallel programming patterns with adaptability features Galante, Guilherme

27 9 p. 12547-12568
article
44 Gene-targeting multiplayer battle game optimizer for large-scale global optimization via cooperative coevolution Zhong, Rui

27 9 p. 12483-12508
article
45 HOGWO: a fog inspired optimized load balancing approach using hybridized grey wolf algorithm Das, Debashreet

27 9 p. 13273-13294
article
46 Hybrid metaheuristics for selective inference task offloading under time and energy constraints for real-time IoT sensing systems Ben Sada, Abdelkarim

27 9 p. 12965-12981
article
47 Improved aquila optimizer with mRMR for feature selection of high-dimensional gene expression data Qin, Xiwen

27 9 p. 13005-13027
article
48 Lightweight secure authentication protocol for automatic dependent surveillance broadcast system Sher, Burhan

27 9 p. 12267-12282
article
49 Machine learning driven four-elements high gain MIMO antenna for wireless connectivity Agrawal, Krishna Kant

27 9 p. 12707-12725
article
50 MDA-YOLO Person: a 2D human pose estimation model based on YOLO detection framework Dong, Chengang

27 9 p. 12323-12340
article
51 Modeling and verification of software evolution using bigraphical reactive system Pal, Nisha

27 9 p. 12983-13003
article
52 Modified clustering and incentivized stable CH selection for reliable VANET communication Kumari, Ashish

27 9 p. 11983-12005
article
53 OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things Al-Amiedy, Taief Alaa

27 9 p. 12141-12184
article
54 OptFBFN: IOT threat mitigation in software-defined networks based on fuzzy approach Dhanalaxmi, B.

27 9 p. 12943-12963
article
55 Optimal power scheduling of microgrid considering renewable sources and demand response management Srivastava, Abhishek

27 9 p. 11851-11872
article
56 PPFLV: privacy-preserving federated learning with verifiability Zhou, Qun

27 9 p. 12727-12743
article
57 Quantum competitive decision algorithm for the emergency siting problem under given deadline conditions Zhao, Wei

27 9 p. 13029-13046
article
58 RAPTS: resource aware prioritized task scheduling technique in heterogeneous fog computing environment Hussain, Mazhar

27 9 p. 13353-13377
article
59 Res2Net-ERNN: deep learning based cyberattack classification in software defined network Maddu, Mamatha

27 9 p. 12821-12839
article
60 Revolutionizing agri-food supply chain management with blockchain-based traceability and navigation integration Aggarwal, Manoj

27 9 p. 12919-12942
article
61 SCIDP–Secure cloud-integrated data dissemination protocol for efficient reprogramming in internet of things Shanmugapriya, R.

27 9 p. 12841-12860
article
62 SCRUB: a novel energy-efficient virtual machines selection and migration scheme in cloud data centers Yekta, Mohammad

27 9 p. 12861-12874
article
63 Secure and efficient content-based image retrieval using dominant local patterns and watermark encryption in cloud computing Sucharitha, G.

27 9 p. 11873-11889
article
64 Soft computing approaches for dynamic multi-objective evaluation of computational offloading: a literature review Khan, Sheharyar

27 9 p. 12459-12481
article
65 STTD: spatial-temporal transformer with double recurrent graph convolutional cooperative network for traffic flow prediction Zeng, Hui

27 9 p. 12069-12089
article
66 Task scheduling in cloud computing systems using honey badger algorithm with improved density factor and foucault pendulum motion Zhang, Si-Wen

27 9 p. 12411-12457
article
67 Three-party evolutionary game-based analysis and stability enhancement of improved PBFT consensus mechanism Wang, Feifan

27 9 p. 12283-12309
article
68 Time-limited ownership delegation scheme with revocation security for healthcare Zhao, Xiaoping

27 9 p. 12105-12121
article
69 Unmanned aerial vehicle assisted communication: applications, challenges, and future outlook Li, Yilin

27 9 p. 13187-13202
article
                             69 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands