nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Achieving reliable timestamp in the bitcoin platform
|
Ma, Guangkai |
|
|
13 |
6 |
p. 2251-2259 |
artikel |
2 |
Adaptive privacy-preserving federated learning
|
Liu, Xiaoyuan |
|
|
13 |
6 |
p. 2356-2366 |
artikel |
3 |
A distributed intelligent mobile application for analyzing travel big data analytics
|
Visuwasam, L. Maria Michael |
|
|
13 |
6 |
p. 2036-2052 |
artikel |
4 |
Advanced delay assured numerical heuristic modelling for peer to peer project management in cloud assisted internet of things platform
|
Wang, Bo |
|
|
13 |
6 |
p. 2166-2176 |
artikel |
5 |
A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment
|
Wang, Haoyang |
|
|
13 |
6 |
p. 2342-2355 |
artikel |
6 |
A high-performance scheduling algorithm using greedy strategy toward quality of service in the cloud environments
|
Zhou, Zhou |
|
|
13 |
6 |
p. 2214-2223 |
artikel |
7 |
An analytical model for churn process in Bitcoin network with ordinary and relay nodes
|
Motlagh, Saeideh G. |
|
|
13 |
6 |
p. 1931-1942 |
artikel |
8 |
An efficient fuzziness based contiguous node refining scheme with cross-layer routing path in WSN
|
Elavarasan, R. |
|
|
13 |
6 |
p. 2099-2111 |
artikel |
9 |
An integrated P2P framework for E-learning
|
Bhagatkar, Nikita |
|
|
13 |
6 |
p. 1967-1989 |
artikel |
10 |
An intelligent approach for energy efficient trajectory design for mobile sink based IoT supported wireless sensor networks
|
Preeth, S. K. Sathya Lakshmi |
|
|
13 |
6 |
p. 2011-2022 |
artikel |
11 |
An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning
|
Wang, Qian |
|
|
13 |
6 |
p. 2285-2299 |
artikel |
12 |
A novel heuristic based energy efficient routing strategy in wireless sensor network
|
Binu, G. S. |
|
|
13 |
6 |
p. 1853-1871 |
artikel |
13 |
A novel multi-objective optimization strategy for enhancing quality of service in IoT-enabled WSN applications
|
Prasanth, A. |
|
|
13 |
6 |
p. 1905-1920 |
artikel |
14 |
A reward based connectivity-aware IoV neighbor selection for improving reliability in healthcare information exchange
|
Thirugnanam, Tamizharasi |
|
|
13 |
6 |
p. 2112-2122 |
artikel |
15 |
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments
|
Shashidhara, R. |
|
|
13 |
6 |
p. 1943-1966 |
artikel |
16 |
A trust-based minimum cost and quality aware data collection scheme in P2P network
|
Ren, Yingying |
|
|
13 |
6 |
p. 2300-2323 |
artikel |
17 |
Channel aware optimized proportional fair scheduler for LTE downlink
|
Monikandan, B. Satheesh |
|
|
13 |
6 |
p. 2135-2144 |
artikel |
18 |
Cognitive radio technology with reduced PAPR and complexity for IoT-based OFDM networks
|
Ajitha, C |
|
|
13 |
6 |
p. 2065-2077 |
artikel |
19 |
Correction to: Reliable data dissemination for the internet of things using Harris hawks optimization
|
Seyfollahi, Ali |
|
|
13 |
6 |
p. 1903-1904 |
artikel |
20 |
CSNN: Password guessing method based on Chinese syllables and neural network
|
Zhang, Yi |
|
|
13 |
6 |
p. 2237-2250 |
artikel |
21 |
Dynamic allocation strategy of VM resources with fuzzy transfer learning method
|
Wu, Xiang |
|
|
13 |
6 |
p. 2201-2213 |
artikel |
22 |
Dynamic alternate buffer switching and congestion control in wireless multimedia sensor networks
|
Sumathi, K. |
|
|
13 |
6 |
p. 2001-2010 |
artikel |
23 |
Efficient and secure k-nearest neighbor query on outsourced data
|
Lian, Huijuan |
|
|
13 |
6 |
p. 2324-2333 |
artikel |
24 |
Efficient distributed privacy-preserving collaborative outlier detection
|
Wei, Zhaohui |
|
|
13 |
6 |
p. 2260-2271 |
artikel |
25 |
Enhanced data accuracy based PATH discovery using backing route selection algorithm in MANET
|
Premanand, R. P. |
|
|
13 |
6 |
p. 2089-2098 |
artikel |
26 |
Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions
|
Wang, Huige |
|
|
13 |
6 |
p. 2334-2341 |
artikel |
27 |
Fuzzy logic hybridized artificial intelligence for computing and networking on internet of things platform
|
Qi, Hongzhuo |
|
|
13 |
6 |
p. 2078-2088 |
artikel |
28 |
Improved community structure discovery algorithm based on combined clique percolation method and K-means algorithm
|
Zhou, Zhou |
|
|
13 |
6 |
p. 2224-2233 |
artikel |
29 |
Improved network lifetime to identify unexploited PATH using series cornerstone PATH algorithm in wireless sensor networks
|
Anshad, A. S. |
|
|
13 |
6 |
p. 2189-2200 |
artikel |
30 |
IOT based wearable sensor for diseases prediction and symptom analysis in healthcare sector
|
Muthu, BalaAnand |
|
|
13 |
6 |
p. 2123-2134 |
artikel |
31 |
MANFIS based SMART home energy management system to support SMART grid
|
G.K, Jabash Samuel |
|
|
13 |
6 |
p. 2177-2188 |
artikel |
32 |
Multicriteria dragonfly graph theory based resource optimized virtual network mapping technique for home medical care service provisioning in cloud
|
Balamurugan, N. |
|
|
13 |
6 |
p. 1872-1885 |
artikel |
33 |
Multi-keyword score threshold and B+ tree indexing based top-K query retrieval in cloud
|
Lekshmi, K. Karthika |
|
|
13 |
6 |
p. 1990-2000 |
artikel |
34 |
Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks
|
Zhu, Youwen |
|
|
13 |
6 |
p. 2272-2284 |
artikel |
35 |
Reliability refinement in VANET with hybrid jamming attacks using novel index based voting algorithm
|
Santhi, G. B. |
|
|
13 |
6 |
p. 2145-2154 |
artikel |
36 |
Reliable data dissemination for the Internet of Things using Harris hawks optimization
|
Seyfollahi, Ali |
|
|
13 |
6 |
p. 1886-1902 |
artikel |
37 |
RETRACTED ARTICLE: Defense model for preserving the wind turbine Records in Cloud Using fog Computing with coupling based cryptography
|
Agasthian, A. |
|
|
13 |
6 |
p. 2155-2165 |
artikel |
38 |
RETRACTED ARTICLE: Machine learning based multi scale parallel K-means++ clustering for cloud assisted internet of things
|
Mydhili, S. K. |
|
|
13 |
6 |
p. 2023-2035 |
artikel |
39 |
RETRACTED ARTICLE: RFDCAR: Robust failure node detection and dynamic congestion aware routing with network coding technique for wireless sensor network
|
Gobinath, T. |
|
|
13 |
6 |
p. 2053-2064 |
artikel |
40 |
Security and privacy of machine learning assisted P2P networks
|
Li, Hongwei |
|
|
13 |
6 |
p. 2234-2236 |
artikel |
41 |
SINR based association algorithm for indoor device-to-device communication networks
|
A. G., Sreedevi |
|
|
13 |
6 |
p. 1921-1930 |
artikel |