Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             72 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Abductive hypothesis testing in cognitive IoT sensor network Jha, Vidyapati

28 8 artikel
2 A blockchain framework for enhancing data security and intrusion detection in the internet of things environment using hybrid deep learning model Gautam, Siddharth

28 8 artikel
3 A cloud service security risk measurement method based on information entropy and Markov chain Yu, Jian

28 8 artikel
4 A decentralized blockchain based privacy preservation scheme for healthcare data security enhancement in cloud Kumar, Narendra

28 8 artikel
5 A distributed cluster-based routing protocol using fuzzy logic and deep reinforcement learning for wireless sensor networks Wang, Chuhang

28 8 artikel
6 Advanced attack graph framework for operational technology: scalable modeling, validation, and risk mitigation Viticchié, Alessio

28 8 artikel
7 Agm-c3banet: a network intrusion detection model for imbalanced data Chen, Xin

28 8 artikel
8 A multi-layered artificial electric field algorithm for numerical optimization and path planning Lei, Xinyu

28 8 artikel
9 A Multi-layer heterogeneous task scheduling strategy in UAVs-assisted MEC networks Pang, ShanChen

28 8 artikel
10 A multi-objective pareto optimization service selection approach considering cloud manufacturing production constraints Zheng, Xiubao

28 8 artikel
11 An enhanced blockchain-based collaborative intrusion detection approach for CBTC systems Li, Qichang

28 8 artikel
12 An industrial small surface defect detection technique based on CEYolo model Li, Biao

28 8 artikel
13 An OTP and watermarking based partial homomorphic approach to authenticated and integrated cloud computing AlShaikh, Muath

28 8 artikel
14 A novel container scheduling algorithm for edge computing: integrating entropy weight method and multi-strategy particle swarm optimization Guo, Liyuan

28 8 artikel
15 A novel sustainable approach for developing internet of things-based transportation networks based on a hybrid energy-aware algorithm Lin, Yongxing

28 8 artikel
16 A pareto-optimal heuristic algorithm to refactor IMS core for cloud-native NFV Chiang, Wei-Kuo

28 8 artikel
17 A stochastic differential oligopoly game for risk management of resource mining in blockchain Saryazdizade, M.

28 8 artikel
18 A study on discriminative power of stylistic features in affect analysis Younesi, Emran

28 8 artikel
19 Bitterling Colony Optimization: a bio-inspired algorithm for global search Lai, Zhipeng

28 8 artikel
20 Blockchain-based access control and privacy preservation in healthcare: a comprehensive survey Tawfik, Ahmed M.

28 8 artikel
21 Blockchain-based node authentication algorithm for securing electronic health record data transmission Malik, Rohit

28 8 artikel
22 Blockchain-based public auditing and secure deduplication for copyright data Yang, Fan

28 8 artikel
23 Blockchain-based secure deduplication and cloud storage auditing with fair arbitration and privacy protection Peng, Xueqi

28 8 artikel
24 Building robust lightweight network intrusion detection: a multi-pronged approach with DSSTE and deep learning for securing edge-enabled industrial IoT applications Rahamathulla, Mohemmed Yousuf

28 8 artikel
25 Cloud-assisted updatable private set intersection cardinality Zhang, Yue

28 8 artikel
26 CN2F: a cloud-native cellular network framework Ganji, Sepehr

28 8 artikel
27 Contract-guardian: a bagging-based gradient boosting decision tree for detection vulnerability in smart contract Ali, Ghazi Mergani Ahmead

28 8 artikel
28 Dbn-igr: dual-branch network for identification and gesture recognition with WiFi signals Li, Zhihua

28 8 artikel
29 Decision support system for Forest fire management using Ontology with Big Data and LLMs Chandra, Ritesh

28 8 artikel
30 Defenses against model stealing attacks in MLaaS: literature review and challenges Mahani, Aouatef

28 8 artikel
31 Design and implementation of fully distributed heterogeneous resource management system He, Qinlu

28 8 artikel
32 Differential privacy-enabled federated learning for secure neural synchronization in protecting industrial data streams Niu, Feifei

28 8 artikel
33 Efficient shard load balancing for scalable blockchain systems Rahman, Fahad

28 8 artikel
34 Energy service selection method based on blockchain smart contract and improved polar bear algorithm Meng, Ziyi

28 8 artikel
35 Enhanced detection, isolation, and accommodation scheme for concurrent sensor failures in industrial processes Wang, Delin

28 8 artikel
36 Enhanced medical image security: a chaotic map and laplace transform-based encryption scheme Inam, Saba

28 8 artikel
37 Enhancing disaster readiness: a comprehensive review of IoT-enabled WSN path planning for effective emergency response Dutta, Jhalak

28 8 artikel
38 Ethereum smart contracts: a hierarchical analysis of vulnerability challenges and mitigation strategies Soofiyan, Salma

28 8 artikel
39 FAMASO: fog-adaptive multi-agent scheduling optimization Nagabushnam, Ganesan

28 8 artikel
40 Fast-CFLB: a privacy-preserving data sharing system for Internet of Vehicles using ternary federated learning and blockchain Li, Jiaheng

28 8 artikel
41 FedDC: a federated learning framework to enhance gradient diversity and mitigate conflicts Liu, Yazhi

28 8 artikel
42 Fog-empowered anomaly detection in IoT networks using one-class asymmetric stacked autoencoder Ayad, Aya G.

28 8 artikel
43 Game-theoretic cloud assistance strategies of end-edge-cloud systems for mitigating edge distributed denial of service attacks Wang, Yi

28 8 artikel
44 HSLRL-DP: based on Hasse sensitivity levels and reinforcement learning trajectory privacy enhancement mechanism Shen, Yanmei

28 8 artikel
45 Hybrid anomaly-based cloud security and machine learning-based behavioral analysis for threat intelligence detection in cloud environment Mamidala, Vijaykumar

28 8 artikel
46 Integrating YOLOv9 and image enhancement on UAV-derived data enhances precision in potato disease detection Gurve, Mahendra Kumar

28 8 artikel
47 Joint device assignment and resource allocation for hierarchical semi-asynchronous federated learning over wireless networks Fan, Wei

28 8 artikel
48 Joint optimization of energy harvesting and data transmission in SWIPT-enabled hybrid precoding mmWave massive MIMO-NOMA systems Ghamry, Walid K.

28 8 artikel
49 MedReward: privacy preservation of electronic health records (EHR) and secure incentive distribution in the presence of active insider and outsider adversaries using blockchain Patil, Shriniwas

28 8 artikel
50 Modeling and analysis of worm computing systems based on stochastic petri nets Shi, Leyi

28 8 artikel
51 Multi-objective optimization empowered spatiotemporal parallel network for online PM2.5 interval prediction Yang, Jingling

28 8 artikel
52 Multi-strategy butterfly optimization algorithm for state estimation in sandwich systems Liu, Xufeng

28 8 artikel
53 Octopus optimization algorithm: a novel single- and multi-objective optimization algorithm for optimization problems Song, Meijia

28 8 artikel
54 Optimization of maximum parallel K-means algorithm based on GPU cluster He, Qinlu

28 8 artikel
55 Optimizing scientific workflow scheduling in cloud environments: a hybrid PSO-EWWO Bevara, Prasanth Kumar

28 8 artikel
56 Optimizing task offloading and resource allocation in latency-constrained vehicular edge computing Li, Bingxian

28 8 artikel
57 Parallel optimization techniques for ultra-large scale refined numerical simulations on Chinese supercomputers Chen, Jinshou

28 8 artikel
58 Power-area efficient serial IMPLY-based 4:2 compressor applied in data-intensive applications Bagheralmoosavi, Bahareh

28 8 artikel
59 Privacy-preserving and robust federated learning scheme with high efficiency through ciphertext filtering Wang, Xiaoming

28 8 artikel
60 QoS-driven reinforcement learning-based resource allocation in space–air–ground–sea integrated networks Tang, Bing

28 8 artikel
61 Quantum neural computing enhanced five-dimensional hyperchaotic framework for secured and reliable communication on the Internet of Things systems Chen, Mu

28 8 artikel
62 Reinforcement learning-based drone-client selection for efficient federated learning-based intrusion detection in FANETs Benfriha, Sihem

28 8 artikel
63 Relation cross-fusion attention assistance networks for multi-hop question answering over knowledge graphs Lv, Yana

28 8 artikel
64 SDIdA-IoT: self-sovereign digital identification and authentication framework for IoT devices using blockchain Jhariya, Mahendra Kumar

28 8 artikel
65 Selective ensemble classification algorithm based on neighborhood-tolerance mutual information Li, Lihong

28 8 artikel
66 SFENet:RGB-D salient detection network enhanced by specific features Li, Bin

28 8 artikel
67 Spinal segmentation based on heatmap regression positioning and improved UNet Huang, Yuyao

28 8 artikel
68 SPySAVer: efficient signature-policy attribute-based server-aided verification signature for industrial-internet-of-things Prasad, Suryakant

28 8 artikel
69 TBSSMC: a trusted blockchain solution for social media content integrity and performance simulation Naik, Madhusudan

28 8 artikel
70 TransMA-Unet: transformer and multi-scale residual connection attention network for vessel segmentation Zhang, Lihong

28 8 artikel
71 UBI-STA: spatiotemporal correlation analysis for user behavior identification in network encrypted traffic Li, Zhiyuan

28 8 artikel
72 YOLOv8-SST lightweight small target fault detection system integrating SENet attention mechanism and Tr-OCR Li, Hui

28 8 artikel
                             72 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland