nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abnormal Brain Function Network Analysis Based on EEG and Machine Learning
|
Chen, Boyu |
|
|
28 |
4 |
p. 1421-1442 |
artikel |
2 |
A Heterogeneous Cloud-Edge Collaborative Computing Architecture with Affinity-Based Workflow Scheduling and Resource Allocation for Internet-of-Things Applications
|
Lyu, Shuyu |
|
|
28 |
4 |
p. 1443-1459 |
artikel |
3 |
A Large-Scale IoT-Based Scheme for Real-Time Prediction of Infectious Disease Symptoms
|
Said, Omar |
|
|
28 |
4 |
p. 1402-1420 |
artikel |
4 |
An Efficient Group-based Service Authentication and Session Key Negotiation Scheme for mMTC Devices in 5G
|
Chiang, Wei-Kuo |
|
|
28 |
4 |
p. 1221-1245 |
artikel |
5 |
A new framework for Physical Layer Security in HetNets based on Radio Resource Allocation and Reinforcement Learning
|
Marabissi, Dania |
|
|
28 |
4 |
p. 1473-1481 |
artikel |
6 |
An Overview of Smart Home IoT Trends and related Cybersecurity Challenges
|
Cvitić, Ivan |
|
|
28 |
4 |
p. 1334-1348 |
artikel |
7 |
A Test Environment for Wireless Hacking in Domestic IoT Scenarios
|
Muñoz, Antonio |
|
|
28 |
4 |
p. 1255-1264 |
artikel |
8 |
Badoo Android and iOS Dating Application Analysis
|
Long, Jack |
|
|
28 |
4 |
p. 1272-1281 |
artikel |
9 |
Bi-Level Optimization Model for Greener Transportation by Vehicular Networks
|
Liu, Kun |
|
|
28 |
4 |
p. 1349-1361 |
artikel |
10 |
Contact Tracing App Privacy: What Data is Shared by Non-GAEN Contact Tracing Apps
|
Leith, Douglas J. |
|
|
28 |
4 |
p. 1460-1472 |
artikel |
11 |
Covert UAV Communication by Exploiting Imperfect Cancellation Under Channel Uncertainty
|
Gao, Tian |
|
|
28 |
4 |
p. 1543-1552 |
artikel |
12 |
Deep Learning Enabled Task-Oriented Semantic Communication for Memory-Limited Devices
|
Deng, Hanmin |
|
|
28 |
4 |
p. 1519-1530 |
artikel |
13 |
Defining Cross-Site Scripting Attack Resilience Guidelines Based on BeEF Framework Simulation
|
Cvitić, Ivan |
|
|
28 |
4 |
p. 1306-1318 |
artikel |
14 |
Design of an Intelligent Application Using a Genetic Algorithm to Determine the Structure and Sales Volumes of Customized Products
|
Behúnová, Annamária |
|
|
28 |
4 |
p. 1325-1333 |
artikel |
15 |
Finding Similar Users over Multiple Attributes on the Basis of Intuitionistic Fuzzy Set
|
Wu, Haitao |
|
|
28 |
4 |
p. 1362-1370 |
artikel |
16 |
5G Integrated User Downlink Adaptive Transmission Scheme for Low Earth Orbit Satellite Internet Access Network
|
Wang, Dongdong |
|
|
28 |
4 |
p. 1553-1564 |
artikel |
17 |
Misreporting Attacks Against Load Balancers in Software-Defined Networking
|
Burke, Quinn |
|
|
28 |
4 |
p. 1482-1497 |
artikel |
18 |
Multi-Agent Cooperative Game Based Task Computing Mechanism for UAV-Assisted 6G NTN
|
Shao, Sujie |
|
|
28 |
4 |
p. 1510-1518 |
artikel |
19 |
Multirole UAVs Supported Parking Surveillance System
|
Jausevac, Goran |
|
|
28 |
4 |
p. 1246-1254 |
artikel |
20 |
Online Monitoring of the Friction Coefficient in the Conditions of Digital Enterprise
|
Martiček, Matúš |
|
|
28 |
4 |
p. 1319-1324 |
artikel |
21 |
Random Access Control and Beam Management Scheme for the 5G NR based Beam Hopping LEO Satellite Communication Systems
|
Wei, Wei |
|
|
28 |
4 |
p. 1531-1542 |
artikel |
22 |
Retinal Vessel Segmentation in Medical Diagnosis using Multi-scale Attention Generative Adversarial Networks
|
Yang, Minqiang |
|
|
28 |
4 |
p. 1391-1401 |
artikel |
23 |
Sickly Apps: A Forensic Analysis of Medical Device Smartphone Applications on Android and iOS Devices
|
Grispos, George |
|
|
28 |
4 |
p. 1282-1292 |
artikel |
24 |
Survey on Image Encryption Schemes, Bio cryptography and Efficient Encryption Algorithms
|
Arul Murugan, Chinnandi |
|
|
28 |
4 |
p. 1385-1390 |
artikel |
25 |
Swarm Learning-based Secure and Fair Model Sharing for Metaverse Healthcare
|
Zhang, Guoqiang |
|
|
28 |
4 |
p. 1498-1509 |
artikel |
26 |
The Fuzzy Logic Predictive Model for Remote Increasing Energy Efficiency
|
Hrehová, Stella |
|
|
28 |
4 |
p. 1293-1305 |
artikel |
27 |
Using Industry 4.0 Tools in the Implementation of Modern Event Marketing
|
Behúnová, Annamária |
|
|
28 |
4 |
p. 1265-1271 |
artikel |
28 |
Whirlpool Algorithm with Hash Function Based Watermarking Algorithm for the Secured Transmission of Digital Medical Images
|
Selvaraj, Priya |
|
|
28 |
4 |
p. 1371-1384 |
artikel |