nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An aerial intelligent relay-road side unit (AIR-RSU) framework for modern intelligent transportation system
|
Raj, A. Samson Arun |
|
|
13 |
3 |
p. 965-986 |
artikel |
2 |
An energy-efficient data prediction and processing approach for the internet of things and sensing based applications
|
Harb, Hassan |
|
|
13 |
3 |
p. 780-795 |
artikel |
3 |
An improved congestion-aware routing mechanism in sensor networks using fuzzy rule sets
|
Sangeetha, G. |
|
|
13 |
3 |
p. 890-904 |
artikel |
4 |
A P2P network based edge computing smart grid model for efficient resources coordination
|
Hou, WenJing |
|
|
13 |
3 |
p. 1026-1037 |
artikel |
5 |
A secure and lightweight privacy-preserving data aggregation scheme for internet of vehicles
|
Hu, Peng |
|
|
13 |
3 |
p. 1002-1013 |
artikel |
6 |
AVRM: adaptive void recovery mechanism to reduce void nodes in wireless sensor networks
|
Ayyasamy, A. |
|
|
13 |
3 |
p. 987-1001 |
artikel |
7 |
Community recombination and duplication node traverse algorithm in opportunistic social networks
|
Wu, Jia |
|
|
13 |
3 |
p. 940-947 |
artikel |
8 |
Correction to: Hierarchical resource scheduling method using improved cuckoo search algorithm for internet of things
|
Zhang, Chunguang |
|
|
13 |
3 |
p. 1070 |
artikel |
9 |
Correction to: Incentive mechanisms for mobile crowd sensing based on supply-demand relationship
|
Xu, Jia |
|
|
13 |
3 |
p. 1069 |
artikel |
10 |
Development of Cloud of Things Based on Proxy Using OCF IoTivity and MQTT for P2P Internetworking
|
Xuan, Songai |
|
|
13 |
3 |
p. 729-741 |
artikel |
11 |
DPAS: A dynamic popularity-aware search mechanism for unstructured P2P systems
|
Khatibi, Elahe |
|
|
13 |
3 |
p. 825-849 |
artikel |
12 |
Effective TDMA scheduling for tree-based data collection using genetic algorithm in wireless sensor networks
|
Osamy, Walid |
|
|
13 |
3 |
p. 796-815 |
artikel |
13 |
Enhanced intrusion detection system via agent clustering and classification based on outlier detection
|
Sandosh, S. |
|
|
13 |
3 |
p. 1038-1045 |
artikel |
14 |
Human immune-based model for intrusion detection in mobile ad hoc networks
|
Abdelhaq, Maha |
|
|
13 |
3 |
p. 1046-1068 |
artikel |
15 |
Intrusion detection system using hybrid tissue growing algorithm for wireless sensor network
|
Umarani, C. |
|
|
13 |
3 |
p. 752-761 |
artikel |
16 |
Next level peer-to-peer overlay networks under high churns: a survey
|
Naik, Ashika R. |
|
|
13 |
3 |
p. 905-931 |
artikel |
17 |
Novel Distributed Dynamic Backbone-based Flooding in Unstructured Networks
|
Saeedvand, Saeed |
|
|
13 |
3 |
p. 872-889 |
artikel |
18 |
Path optimization of box-covering based routing to minimize average packet delay in software defined network
|
Gurusamy, UmaMaheswari |
|
|
13 |
3 |
p. 932-939 |
artikel |
19 |
Performance analysis of Hyperledger Fabric platform: A hierarchical model approach
|
Jiang, Lili |
|
|
13 |
3 |
p. 1014-1025 |
artikel |
20 |
Performance of low level protocols in high traffic wireless body sensor networks
|
Boudargham, Nadine |
|
|
13 |
3 |
p. 850-871 |
artikel |
21 |
Reliable and secure data communication in wireless sensor networks using optimal locally recoverable codes
|
C., Pavan Kumar |
|
|
13 |
3 |
p. 742-751 |
artikel |
22 |
SDN- and fog computing-based switchable routing using path stability estimation for vehicular ad hoc networks
|
Noorani, Naserali |
|
|
13 |
3 |
p. 948-964 |
artikel |
23 |
Secure & efficient intra-MME handovers via mobile relays within the LTE-A and future 5G high-speed train networks
|
Singh, Garima |
|
|
13 |
3 |
p. 762-779 |
artikel |
24 |
Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol
|
Aghili, Seyed Farhad |
|
|
13 |
3 |
p. 816-824 |
artikel |