nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis
|
Mehtab, Anam |
|
|
25 |
1 |
p. 180-192 |
artikel |
2 |
A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises
|
Andreolini, Mauro |
|
|
25 |
1 |
p. 236-247 |
artikel |
3 |
A Market in Dream: the Rapid Development of Anonymous Cybercrime
|
Zhou, Gengqian |
|
|
25 |
1 |
p. 259-270 |
artikel |
4 |
An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices
|
Ribeiro, José |
|
|
25 |
1 |
p. 164-172 |
artikel |
5 |
An Auxiliary Antenna Based Inter-User Interference Mitigation Approach in Full-Duplex Wireless Networks
|
Wu, Fei |
|
|
25 |
1 |
p. 16-22 |
artikel |
6 |
Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic
|
Das, Anjana P. |
|
|
25 |
1 |
p. 55-67 |
artikel |
7 |
A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration
|
Feng, Bin |
|
|
25 |
1 |
p. 82-94 |
artikel |
8 |
A Physical-Layer Key Distribution Mechanism for IoT Networks
|
Alhasanat, Mohanad |
|
|
25 |
1 |
p. 173-178 |
artikel |
9 |
A Physical-Layer Key Distribution Mechanism for IoT Networks
|
Alhasanat, Mohanad |
|
|
25 |
1 |
p. 173-178 |
artikel |
10 |
Applying Improved Convolutional Neural Network in Image Classification
|
Hu, Zhen-tao |
|
|
25 |
1 |
p. 133-141 |
artikel |
11 |
Confusing-Keyword Based Secure Search over Encrypted Cloud Data
|
Fu, Zhangjie |
|
|
25 |
1 |
p. 125-132 |
artikel |
12 |
Consortium Blockchain-Based Secure Software Defined Vehicular Network
|
Zhao, Ning |
|
|
25 |
1 |
p. 314-327 |
artikel |
13 |
Coordinated Handover Signaling and Cross-Layer Adaptation in Heterogeneous Wireless Networking
|
Al Emam, Fatma A. |
|
|
25 |
1 |
p. 285-299 |
artikel |
14 |
Correction to: A Physical-Layer Key Distribution Mechanism for IoT Networks
|
Alhasanat, Mohanad |
|
|
25 |
1 |
p. 179 |
artikel |
15 |
Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm
|
Kantour, Nedjmeddine |
|
|
25 |
1 |
p. 211-222 |
artikel |
16 |
Disk Cluster Allocation Behavior in Windows and NTFS
|
Karresand, Martin |
|
|
25 |
1 |
p. 248-258 |
artikel |
17 |
Editorial: Advanced Techniques for Memory Forensics Analysis
|
Lanzi, Andrea |
|
|
25 |
1 |
p. 234-235 |
artikel |
18 |
Editorial: Physical Layer Security and Wireless Access Control (QSHINE 2017)
|
Wang, Lei |
|
|
25 |
1 |
p. 1-3 |
artikel |
19 |
Editorial: Reliable Communication for Emerging Wireless Networks
|
Duong, Trung Q. |
|
|
25 |
1 |
p. 271-273 |
artikel |
20 |
Editorial: Security and Privacy Protection for Mobile Applications and Platforms
|
Sucasas, Victor |
|
|
25 |
1 |
p. 151-152 |
artikel |
21 |
Enhancing Efficient Link Performance in ZigBee Under Cross-Technology Interference
|
Qin, Zhenquan |
|
|
25 |
1 |
p. 68-81 |
artikel |
22 |
Full-Duplex Enabled Time-Efficient Device Discovery for Public Safety Communications
|
Kaleem, Zeeshan |
|
|
25 |
1 |
p. 341-349 |
artikel |
23 |
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks
|
Ramadan, Mohammed |
|
|
25 |
1 |
p. 223-233 |
artikel |
24 |
Joint Optimization of Latency Monitoring and Traffic Scheduling in Software Defined Heterogeneous Networks
|
Zhang, Xu |
|
|
25 |
1 |
p. 102-113 |
artikel |
25 |
Joint User Association and Power Allocation for Millimeter-Wave Ultra-Dense Networks
|
Nguyen, H. T. |
|
|
25 |
1 |
p. 274-284 |
artikel |
26 |
Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions
|
Vo, Van Nhan |
|
|
25 |
1 |
p. 23-41 |
artikel |
27 |
PBDT: an Energy-Efficient Posture based Data Transmission for Repeated Activities in BAN
|
Maitra, Tanmoy |
|
|
25 |
1 |
p. 328-340 |
artikel |
28 |
Performance Analysis of Full-Duplex Vehicle-to-Vehicle Relay System over Double-Rayleigh Fading Channels
|
Nguyen, Ba Cao |
|
|
25 |
1 |
p. 363-372 |
artikel |
29 |
Performance Specifications for the Roll-Off Factor and Filter Order for Filtered Multitone Modulation in the Maritime VHF Data Exchange System
|
Hu, Qing |
|
|
25 |
1 |
p. 142-150 |
artikel |
30 |
Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers
|
Al-Mistarihi, Mamoun F. |
|
|
25 |
1 |
p. 42-54 |
artikel |
31 |
Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud
|
Rasool, Saqib |
|
|
25 |
1 |
p. 153-163 |
artikel |
32 |
Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers
|
Vo, Van Nhan |
|
|
25 |
1 |
p. 193-210 |
artikel |
33 |
Security and Privacy Issues of UAV: A Survey
|
Zhi, Yueyan |
|
|
25 |
1 |
p. 95-101 |
artikel |
34 |
Security Performance Analysis of Underlay Cognitive Networks with Helpful Jammer Under Interference from Primary Transmitter
|
Ho-Van, Khuong |
|
|
25 |
1 |
p. 4-15 |
artikel |
35 |
Topology Optimizing in FSO-based UAVs Relay Networks for Resilience Enhancement
|
Gu, Zhiqun |
|
|
25 |
1 |
p. 350-362 |
artikel |
36 |
Uplink Resource Allocation for Multi-Cluster Internet-of-Things Deployment Underlaying Cellular Networks
|
ElHalawany, Basem M. |
|
|
25 |
1 |
p. 300-313 |
artikel |
37 |
WECAN: an Efficient West-East Control Associated Network for Large-Scale SDN Systems
|
Yu, Haisheng |
|
|
25 |
1 |
p. 114-124 |
artikel |