nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abductive hypothesis testing in cognitive IoT sensor network
|
Jha, Vidyapati |
|
|
28 |
8 |
|
artikel |
2 |
A blockchain framework for enhancing data security and intrusion detection in the internet of things environment using hybrid deep learning model
|
Gautam, Siddharth |
|
|
28 |
8 |
|
artikel |
3 |
A cloud service security risk measurement method based on information entropy and Markov chain
|
Yu, Jian |
|
|
28 |
8 |
|
artikel |
4 |
A decentralized blockchain based privacy preservation scheme for healthcare data security enhancement in cloud
|
Kumar, Narendra |
|
|
28 |
8 |
|
artikel |
5 |
A distributed cluster-based routing protocol using fuzzy logic and deep reinforcement learning for wireless sensor networks
|
Wang, Chuhang |
|
|
28 |
8 |
|
artikel |
6 |
Advanced attack graph framework for operational technology: scalable modeling, validation, and risk mitigation
|
Viticchié, Alessio |
|
|
28 |
8 |
|
artikel |
7 |
Agm-c3banet: a network intrusion detection model for imbalanced data
|
Chen, Xin |
|
|
28 |
8 |
|
artikel |
8 |
A multi-layered artificial electric field algorithm for numerical optimization and path planning
|
Lei, Xinyu |
|
|
28 |
8 |
|
artikel |
9 |
A Multi-layer heterogeneous task scheduling strategy in UAVs-assisted MEC networks
|
Pang, ShanChen |
|
|
28 |
8 |
|
artikel |
10 |
A multi-objective pareto optimization service selection approach considering cloud manufacturing production constraints
|
Zheng, Xiubao |
|
|
28 |
8 |
|
artikel |
11 |
An enhanced blockchain-based collaborative intrusion detection approach for CBTC systems
|
Li, Qichang |
|
|
28 |
8 |
|
artikel |
12 |
An industrial small surface defect detection technique based on CEYolo model
|
Li, Biao |
|
|
28 |
8 |
|
artikel |
13 |
An OTP and watermarking based partial homomorphic approach to authenticated and integrated cloud computing
|
AlShaikh, Muath |
|
|
28 |
8 |
|
artikel |
14 |
A novel container scheduling algorithm for edge computing: integrating entropy weight method and multi-strategy particle swarm optimization
|
Guo, Liyuan |
|
|
28 |
8 |
|
artikel |
15 |
A novel sustainable approach for developing internet of things-based transportation networks based on a hybrid energy-aware algorithm
|
Lin, Yongxing |
|
|
28 |
8 |
|
artikel |
16 |
A pareto-optimal heuristic algorithm to refactor IMS core for cloud-native NFV
|
Chiang, Wei-Kuo |
|
|
28 |
8 |
|
artikel |
17 |
A stochastic differential oligopoly game for risk management of resource mining in blockchain
|
Saryazdizade, M. |
|
|
28 |
8 |
|
artikel |
18 |
A study on discriminative power of stylistic features in affect analysis
|
Younesi, Emran |
|
|
28 |
8 |
|
artikel |
19 |
Bitterling Colony Optimization: a bio-inspired algorithm for global search
|
Lai, Zhipeng |
|
|
28 |
8 |
|
artikel |
20 |
Blockchain-based access control and privacy preservation in healthcare: a comprehensive survey
|
Tawfik, Ahmed M. |
|
|
28 |
8 |
|
artikel |
21 |
Blockchain-based node authentication algorithm for securing electronic health record data transmission
|
Malik, Rohit |
|
|
28 |
8 |
|
artikel |
22 |
Blockchain-based public auditing and secure deduplication for copyright data
|
Yang, Fan |
|
|
28 |
8 |
|
artikel |
23 |
Blockchain-based secure deduplication and cloud storage auditing with fair arbitration and privacy protection
|
Peng, Xueqi |
|
|
28 |
8 |
|
artikel |
24 |
Building robust lightweight network intrusion detection: a multi-pronged approach with DSSTE and deep learning for securing edge-enabled industrial IoT applications
|
Rahamathulla, Mohemmed Yousuf |
|
|
28 |
8 |
|
artikel |
25 |
Cloud-assisted updatable private set intersection cardinality
|
Zhang, Yue |
|
|
28 |
8 |
|
artikel |
26 |
CN2F: a cloud-native cellular network framework
|
Ganji, Sepehr |
|
|
28 |
8 |
|
artikel |
27 |
Contract-guardian: a bagging-based gradient boosting decision tree for detection vulnerability in smart contract
|
Ali, Ghazi Mergani Ahmead |
|
|
28 |
8 |
|
artikel |
28 |
Dbn-igr: dual-branch network for identification and gesture recognition with WiFi signals
|
Li, Zhihua |
|
|
28 |
8 |
|
artikel |
29 |
Decision support system for Forest fire management using Ontology with Big Data and LLMs
|
Chandra, Ritesh |
|
|
28 |
8 |
|
artikel |
30 |
Defenses against model stealing attacks in MLaaS: literature review and challenges
|
Mahani, Aouatef |
|
|
28 |
8 |
|
artikel |
31 |
Design and implementation of fully distributed heterogeneous resource management system
|
He, Qinlu |
|
|
28 |
8 |
|
artikel |
32 |
Differential privacy-enabled federated learning for secure neural synchronization in protecting industrial data streams
|
Niu, Feifei |
|
|
28 |
8 |
|
artikel |
33 |
Efficient shard load balancing for scalable blockchain systems
|
Rahman, Fahad |
|
|
28 |
8 |
|
artikel |
34 |
Energy service selection method based on blockchain smart contract and improved polar bear algorithm
|
Meng, Ziyi |
|
|
28 |
8 |
|
artikel |
35 |
Enhanced detection, isolation, and accommodation scheme for concurrent sensor failures in industrial processes
|
Wang, Delin |
|
|
28 |
8 |
|
artikel |
36 |
Enhanced medical image security: a chaotic map and laplace transform-based encryption scheme
|
Inam, Saba |
|
|
28 |
8 |
|
artikel |
37 |
Enhancing disaster readiness: a comprehensive review of IoT-enabled WSN path planning for effective emergency response
|
Dutta, Jhalak |
|
|
28 |
8 |
|
artikel |
38 |
Ethereum smart contracts: a hierarchical analysis of vulnerability challenges and mitigation strategies
|
Soofiyan, Salma |
|
|
28 |
8 |
|
artikel |
39 |
FAMASO: fog-adaptive multi-agent scheduling optimization
|
Nagabushnam, Ganesan |
|
|
28 |
8 |
|
artikel |
40 |
Fast-CFLB: a privacy-preserving data sharing system for Internet of Vehicles using ternary federated learning and blockchain
|
Li, Jiaheng |
|
|
28 |
8 |
|
artikel |
41 |
FedDC: a federated learning framework to enhance gradient diversity and mitigate conflicts
|
Liu, Yazhi |
|
|
28 |
8 |
|
artikel |
42 |
Fog-empowered anomaly detection in IoT networks using one-class asymmetric stacked autoencoder
|
Ayad, Aya G. |
|
|
28 |
8 |
|
artikel |
43 |
Game-theoretic cloud assistance strategies of end-edge-cloud systems for mitigating edge distributed denial of service attacks
|
Wang, Yi |
|
|
28 |
8 |
|
artikel |
44 |
HSLRL-DP: based on Hasse sensitivity levels and reinforcement learning trajectory privacy enhancement mechanism
|
Shen, Yanmei |
|
|
28 |
8 |
|
artikel |
45 |
Hybrid anomaly-based cloud security and machine learning-based behavioral analysis for threat intelligence detection in cloud environment
|
Mamidala, Vijaykumar |
|
|
28 |
8 |
|
artikel |
46 |
Integrating YOLOv9 and image enhancement on UAV-derived data enhances precision in potato disease detection
|
Gurve, Mahendra Kumar |
|
|
28 |
8 |
|
artikel |
47 |
Joint device assignment and resource allocation for hierarchical semi-asynchronous federated learning over wireless networks
|
Fan, Wei |
|
|
28 |
8 |
|
artikel |
48 |
Joint optimization of energy harvesting and data transmission in SWIPT-enabled hybrid precoding mmWave massive MIMO-NOMA systems
|
Ghamry, Walid K. |
|
|
28 |
8 |
|
artikel |
49 |
MedReward: privacy preservation of electronic health records (EHR) and secure incentive distribution in the presence of active insider and outsider adversaries using blockchain
|
Patil, Shriniwas |
|
|
28 |
8 |
|
artikel |
50 |
Modeling and analysis of worm computing systems based on stochastic petri nets
|
Shi, Leyi |
|
|
28 |
8 |
|
artikel |
51 |
Multi-objective optimization empowered spatiotemporal parallel network for online PM2.5 interval prediction
|
Yang, Jingling |
|
|
28 |
8 |
|
artikel |
52 |
Multi-strategy butterfly optimization algorithm for state estimation in sandwich systems
|
Liu, Xufeng |
|
|
28 |
8 |
|
artikel |
53 |
Octopus optimization algorithm: a novel single- and multi-objective optimization algorithm for optimization problems
|
Song, Meijia |
|
|
28 |
8 |
|
artikel |
54 |
Optimization of maximum parallel K-means algorithm based on GPU cluster
|
He, Qinlu |
|
|
28 |
8 |
|
artikel |
55 |
Optimizing scientific workflow scheduling in cloud environments: a hybrid PSO-EWWO
|
Bevara, Prasanth Kumar |
|
|
28 |
8 |
|
artikel |
56 |
Optimizing task offloading and resource allocation in latency-constrained vehicular edge computing
|
Li, Bingxian |
|
|
28 |
8 |
|
artikel |
57 |
Parallel optimization techniques for ultra-large scale refined numerical simulations on Chinese supercomputers
|
Chen, Jinshou |
|
|
28 |
8 |
|
artikel |
58 |
Power-area efficient serial IMPLY-based 4:2 compressor applied in data-intensive applications
|
Bagheralmoosavi, Bahareh |
|
|
28 |
8 |
|
artikel |
59 |
Privacy-preserving and robust federated learning scheme with high efficiency through ciphertext filtering
|
Wang, Xiaoming |
|
|
28 |
8 |
|
artikel |
60 |
QoS-driven reinforcement learning-based resource allocation in space–air–ground–sea integrated networks
|
Tang, Bing |
|
|
28 |
8 |
|
artikel |
61 |
Quantum neural computing enhanced five-dimensional hyperchaotic framework for secured and reliable communication on the Internet of Things systems
|
Chen, Mu |
|
|
28 |
8 |
|
artikel |
62 |
Reinforcement learning-based drone-client selection for efficient federated learning-based intrusion detection in FANETs
|
Benfriha, Sihem |
|
|
28 |
8 |
|
artikel |
63 |
Relation cross-fusion attention assistance networks for multi-hop question answering over knowledge graphs
|
Lv, Yana |
|
|
28 |
8 |
|
artikel |
64 |
SDIdA-IoT: self-sovereign digital identification and authentication framework for IoT devices using blockchain
|
Jhariya, Mahendra Kumar |
|
|
28 |
8 |
|
artikel |
65 |
Selective ensemble classification algorithm based on neighborhood-tolerance mutual information
|
Li, Lihong |
|
|
28 |
8 |
|
artikel |
66 |
SFENet:RGB-D salient detection network enhanced by specific features
|
Li, Bin |
|
|
28 |
8 |
|
artikel |
67 |
Spinal segmentation based on heatmap regression positioning and improved UNet
|
Huang, Yuyao |
|
|
28 |
8 |
|
artikel |
68 |
SPySAVer: efficient signature-policy attribute-based server-aided verification signature for industrial-internet-of-things
|
Prasad, Suryakant |
|
|
28 |
8 |
|
artikel |
69 |
TBSSMC: a trusted blockchain solution for social media content integrity and performance simulation
|
Naik, Madhusudan |
|
|
28 |
8 |
|
artikel |
70 |
TransMA-Unet: transformer and multi-scale residual connection attention network for vessel segmentation
|
Zhang, Lihong |
|
|
28 |
8 |
|
artikel |
71 |
UBI-STA: spatiotemporal correlation analysis for user behavior identification in network encrypted traffic
|
Li, Zhiyuan |
|
|
28 |
8 |
|
artikel |
72 |
YOLOv8-SST lightweight small target fault detection system integrating SENet attention mechanism and Tr-OCR
|
Li, Hui |
|
|
28 |
8 |
|
artikel |