nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network
|
Bounouni, Mahdi |
|
2018 |
74 |
10 |
p. 5373-5398 |
artikel |
2 |
A hybrid data replication strategy with fuzzy-based deletion for heterogeneous cloud data centers
|
Mansouri, N. |
|
2018 |
74 |
10 |
p. 5349-5372 |
artikel |
3 |
A low cost wearable wireless sensing system for paretic hand management after stroke
|
Min, Se-Dong |
|
2016 |
74 |
10 |
p. 5231-5240 |
artikel |
4 |
A machine learning approach for feature selection traffic classification using security analysis
|
Shafiq, Muhammad |
|
2018 |
74 |
10 |
p. 4867-4892 |
artikel |
5 |
An efficient approach for publishing microdata for multiple sensitive attributes
|
Anjum, Adeel |
|
2018 |
74 |
10 |
p. 5127-5155 |
artikel |
6 |
An optimization framework for the capacity allocation and admission control of MapReduce jobs in cloud systems
|
Malekimajd, M. |
|
2018 |
74 |
10 |
p. 5314-5348 |
artikel |
7 |
A security review of local government using NIST CSF: a case study
|
Ibrahim, Ahmed |
|
2018 |
74 |
10 |
p. 5171-5186 |
artikel |
8 |
A stochastic link-fault-tolerant routing algorithm in folded hypercubes
|
Thuan, Bui Thi |
|
2018 |
74 |
10 |
p. 5539-5557 |
artikel |
9 |
CDCSS: cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber attacks
|
Mirza, Muhammad Ayzed |
|
2018 |
74 |
10 |
p. 5082-5098 |
artikel |
10 |
Chain-based big data access control infrastructure
|
Sifah, Emmanuel Boateng |
|
2018 |
74 |
10 |
p. 4945-4964 |
artikel |
11 |
Confidential smart-sensing framework in the IoT era
|
Al-Turjman, Fadi |
|
2018 |
74 |
10 |
p. 5187-5198 |
artikel |
12 |
Continuous memory allocation model for cloud services
|
Alyatama, Anwar |
|
2018 |
74 |
10 |
p. 5513-5538 |
artikel |
13 |
CWBound: boundary node detection algorithm for complex non-convex mobile ad hoc networks
|
Cheong, Se-Hang |
|
2018 |
74 |
10 |
p. 5558-5577 |
artikel |
14 |
Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution
|
Sedjelmaci, Hichem |
|
2018 |
74 |
10 |
p. 4928-4944 |
artikel |
15 |
Design of DRAM-NAND flash hybrid main memory and Q-learning-based prefetching method
|
Yoon, Su-Kyung |
|
2018 |
74 |
10 |
p. 5293-5313 |
artikel |
16 |
ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures
|
Yang, Wencheng |
|
2018 |
74 |
10 |
p. 4893-4909 |
artikel |
17 |
E-OSched: a load balancing scheduler for heterogeneous multicores
|
Khalid, Yasir Noman |
|
2018 |
74 |
10 |
p. 5399-5431 |
artikel |
18 |
Forensic investigation to detect forgeries in ASF files of contemporary IP cameras
|
Khan, Rashid Masood |
|
2018 |
74 |
10 |
p. 5060-5081 |
artikel |
19 |
Identifying critical autonomous systems in the Internet
|
Nur, Abdullah Yasin |
|
2018 |
74 |
10 |
p. 4965-4985 |
artikel |
20 |
Improving NMF-based community discovery using distributed robust nonnegative matrix factorization with SimRank similarity measure
|
He, Chaobo |
|
2018 |
74 |
10 |
p. 5601-5624 |
artikel |
21 |
Infrequent pattern mining in smart healthcare environment using data summarization
|
Ahmed, Mohiuddin |
|
2018 |
74 |
10 |
p. 5041-5059 |
artikel |
22 |
Modeling SmallClient indexing framework for big data analytics
|
Siddiqa, Aisha |
|
2017 |
74 |
10 |
p. 5241-5262 |
artikel |
23 |
Multi-queue scheduling of heterogeneous jobs in hybrid geo-distributed cloud environment
|
Chunlin, Li |
|
2018 |
74 |
10 |
p. 5263-5292 |
artikel |
24 |
Multi-tenant intrusion detection system for public cloud (MTIDS)
|
Hawedi, Mohamed |
|
2018 |
74 |
10 |
p. 5199-5230 |
artikel |
25 |
NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks
|
Mehmood, Amjad |
|
2018 |
74 |
10 |
p. 5156-5170 |
artikel |
26 |
Next-generation cybersecurity through a blockchain-enabled federated cloud framework
|
Malomo, Olumide O. |
|
2018 |
74 |
10 |
p. 5099-5126 |
artikel |
27 |
Optimizing inter-nest data locality in imperfect stencils based on loop blocking
|
Seyfari, Yousef |
|
2018 |
74 |
10 |
p. 5432-5460 |
artikel |
28 |
PL-DVFS: combining Power-aware List-based scheduling algorithm with DVFS technique for real-time tasks in Cloud Computing
|
Safari, Monireh |
|
2018 |
74 |
10 |
p. 5578-5600 |
artikel |
29 |
Prediction of air travel demand using a hybrid artificial neural network (ANN) with Bat and Firefly algorithms: a case study
|
Mostafaeipour, Ali |
|
2018 |
74 |
10 |
p. 5461-5484 |
artikel |
30 |
Real-time identification of three Tor pluggable transports using machine learning techniques
|
Soleimani, Mohammad Hassan Mojtahed |
|
2018 |
74 |
10 |
p. 4910-4927 |
artikel |
31 |
SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks
|
Ubaid, Saqib |
|
2018 |
74 |
10 |
p. 5022-5040 |
artikel |
32 |
Security threats to critical infrastructure: the human factor
|
Ghafir, Ibrahim |
|
2018 |
74 |
10 |
p. 4986-5002 |
artikel |
33 |
Threats to critical infrastructure from AI and human intelligence
|
Chaudhry, Junaid |
|
2018 |
74 |
10 |
p. 4865-4866 |
artikel |
34 |
Towards ontology-based multilingual URL filtering: a big data problem
|
Hussain, Mubashar |
|
2018 |
74 |
10 |
p. 5003-5021 |
artikel |
35 |
Virtual sensor as a service: a new multicriteria QoS-aware cloud service composition for IoT applications
|
Khansari, Mina Emami |
|
2018 |
74 |
10 |
p. 5485-5512 |
artikel |