nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive Security for Self-Protection of Mobile Computing Devices
|
Ahmad, Aakash |
|
|
28 |
2 |
p. 653-672 |
artikel |
2 |
A Dominating Tree Based Leader Election Algorithm for Smart Cities IoT Infrastructure
|
Kadjouh, Nabil |
|
|
28 |
2 |
p. 718-731 |
artikel |
3 |
Advancing Security in the Industrial Internet of Things Using Deep Progressive Neural Networks
|
Sharma, Mehul |
|
|
28 |
2 |
p. 782-794 |
artikel |
4 |
A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication
|
Qi, Hui |
|
|
28 |
2 |
p. 473-485 |
artikel |
5 |
An Encrypted Proposal Method in Membrane Computing Aggregation (MCA)
|
Albert, Alberto Arteta |
|
|
28 |
2 |
p. 499-506 |
artikel |
6 |
An Energy-Efficient Clustering Algorithm for Maximizing Lifetime of Wireless Sensor Networks using Machine Learning
|
Debasis, Kumar |
|
|
28 |
2 |
p. 853-867 |
artikel |
7 |
A New Meminductor Based Hyperchaotic Circuit and its Implementation
|
Ma, Xujiong |
|
|
28 |
2 |
p. 542-550 |
artikel |
8 |
An Improved Recommendation Algorithm For Polarized Population
|
Wang, Baowei |
|
|
28 |
2 |
p. 460-472 |
artikel |
9 |
A Novel Approach for Continuous Authentication of Mobile Users Using Reduce Feature Elimination (RFE): A Machine Learning Approach
|
kumari, Sonal |
|
|
28 |
2 |
p. 767-781 |
artikel |
10 |
Correction to: Editorial: Renaissance of Biomimicry Computing
|
Casey, William A. |
|
|
28 |
2 |
p. 490 |
artikel |
11 |
Detection Algorithm of Compressed Sensing Signal in Generalized Spatial Modulation System
|
Jiang, Xiaolin |
|
|
28 |
2 |
p. 551-560 |
artikel |
12 |
Editorial: Renaissance of Biomimicry Computing
|
A. Casey, William |
|
|
28 |
2 |
p. 486-489 |
artikel |
13 |
Editorial: sensing, Service and Security in Mobile Internet (MobilWare 2020)
|
Huang, Baoqi |
|
|
28 |
2 |
p. 437-438 |
artikel |
14 |
Editorial: Smart Societies, Infrastructure, Systems, Technologies, and Applications
|
Mehmood, Rashid |
|
|
28 |
2 |
p. 598-602 |
artikel |
15 |
Editorial: The New Era of Computer Network by using Machine Learning
|
Namasudra, Suyel |
|
|
28 |
2 |
p. 764-766 |
artikel |
16 |
Extraction of Naturalistic Driving Patterns with Geographic Information Systems
|
Balsa-Barreiro, José |
|
|
28 |
2 |
p. 619-635 |
artikel |
17 |
Fog-Assisted Secure Data Exchange for Examination and Testing in E-learning System
|
Kausar, Samina |
|
|
28 |
2 |
p. 673-689 |
artikel |
18 |
Fog Computing for 5G-Enabled Tactile Internet: Research Issues, Challenges, and Future Research Directions
|
Aggarwal, Shubhani |
|
|
28 |
2 |
p. 690-717 |
artikel |
19 |
High-Precision Harmonic Analysis Algorithm Based on Five-Term MSD Second-Order Self-Convolution Window Four-Spectrum-Line Interpolation
|
Yang, Qingjiang |
|
|
28 |
2 |
p. 579-585 |
artikel |
20 |
Iktishaf: a Big Data Road-Traffic Event Detection Tool Using Twitter and Spark Machine Learning
|
Alomari, Ebtesam |
|
|
28 |
2 |
p. 603-618 |
artikel |
21 |
Improve the Security of Industrial Control System: A Fine-Grained Classification Method for DoS Attacks on Modbus/TCP
|
Zhang, Hao |
|
|
28 |
2 |
p. 839-852 |
artikel |
22 |
Improving Formal Verification and Testing Techniques for Internet of Things and Smart Cities
|
Krichen, Moez |
|
|
28 |
2 |
p. 732-743 |
artikel |
23 |
Mesh Router Nodes Placement for Wireless Mesh Networks Based on an Enhanced Moth–Flame Optimization Algorithm
|
Taleb, Sylia Mekhmoukh |
|
|
28 |
2 |
p. 518-541 |
artikel |
24 |
Multistability Analysis and Digital Circuit Implementation of a New Conformable Fractional-Order Chaotic System
|
Ma, Chenguang |
|
|
28 |
2 |
p. 561-570 |
artikel |
25 |
On Fitness Landscape Analysis of Permutation Problems: From Distance Metrics to Mutation Operator Selection
|
Cicirello, Vincent A. |
|
|
28 |
2 |
p. 507-517 |
artikel |
26 |
Power-Aware Fog Supported IoT Network for Healthcare Infrastructure Using Swarm Intelligence-Based Algorithms
|
Ali, Hafiz Munsub |
|
|
28 |
2 |
p. 824-838 |
artikel |
27 |
Predicting Supramolecular Structure from the Statistics of Individual Molecular Events
|
Pilkiewicz, Kevin R. |
|
|
28 |
2 |
p. 491-498 |
artikel |
28 |
Quantum Mayfly Optimization with Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification Model
|
Alzubi, Omar A. |
|
|
28 |
2 |
p. 795-807 |
artikel |
29 |
Simultaneous Wireless Information and Power Transfer for OFDM-based Cooperative Communication
|
Liu, Xueying |
|
|
28 |
2 |
p. 586-597 |
artikel |
30 |
Study on the Elimination of MIMO Signal Interference in Data Chain System
|
Jiang, Xiaolin |
|
|
28 |
2 |
p. 571-578 |
artikel |
31 |
Study QoS-aware Fog Computing for Disease Diagnosis and Prognosis
|
Peng, Dandan |
|
|
28 |
2 |
p. 452-459 |
artikel |
32 |
TAAWUN: a Decision Fusion and Feature Specific Road Detection Approach for Connected Autonomous Vehicles
|
Alam, Furqan |
|
|
28 |
2 |
p. 636-652 |
artikel |
33 |
The Effects of Climatological Factors on Global Influenza Across Temperate and Tropical Regions
|
Yuan, Zhilu |
|
|
28 |
2 |
p. 439-451 |
artikel |
34 |
UAVs and Mobile Sensors Trajectories Optimization with Deep Learning Trained by Genetic Algorithm Towards Data Collection Scenario
|
Pan, Yuwen |
|
|
28 |
2 |
p. 808-823 |
artikel |
35 |
ZAKI: A Smart Method and Tool for Automatic Performance Optimization of Parallel SpMV Computations on Distributed Memory Machines
|
Usman, Sardar |
|
|
28 |
2 |
p. 744-763 |
artikel |