nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
All-dummy k-anonymous privacy protection algorithm based on location offset
|
Liu, Jianghui |
|
|
104 |
8 |
p. 1739-1751 |
artikel |
2 |
An overview of data reduction solutions at the edge of IoT systems: a systematic mapping of the literature
|
Pioli, Laércio |
|
|
104 |
8 |
p. 1867-1889 |
artikel |
3 |
A reliability estimation framework for cognitive radio V2V communications and an ANN-based model for automating estimations
|
Bahramnejad, Somayeh |
|
|
104 |
8 |
p. 1923-1947 |
artikel |
4 |
A wrapper method based on a modified two-step league championship algorithm for detecting botnets in IoT environments
|
Shojarazavi, Taha |
|
|
104 |
8 |
p. 1753-1774 |
artikel |
5 |
Formal model for inter-component communication and its security in android
|
El-Zawawy, Mohamed A. |
|
|
104 |
8 |
p. 1839-1865 |
artikel |
6 |
Parallelism of the finite-time dynamics method based on GPU
|
Kong, Yongfeng |
|
|
104 |
8 |
p. 1721-1738 |
artikel |
7 |
Performance analysis of the unslotted IEEE 802.15.4k MAC protocols under saturated traffic and fading channel conditions
|
Alkama, Lynda |
|
|
104 |
8 |
p. 1891-1922 |
artikel |
8 |
Wireless sensor networks: a survey, categorization, main issues, and future orientations for clustering protocols
|
El Khediri, Salim |
|
|
104 |
8 |
p. 1775-1837 |
artikel |