Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             57 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A critical analysis of RPL objective functions in internet of things paradigm Gupta, Neeti

14 4 p. 2187-2208
artikel
2 Adaptive cost and energy aware secure peer-to-peer computational offloading in the edge-cloud enabled healthcare system Jayaram, Ramaprabha

14 4 p. 2209-2223
artikel
3 A deep learning-based constrained intelligent routing method Rao, Zheheng

14 4 p. 2224-2235
artikel
4 A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment Rani, Deevi Radha

14 4 p. 2385-2398
artikel
5 A Grey-Wolf based Optimized Clustering approach to improve QoS in wireless sensor networks for IoT applications Jaiswal, Kavita

14 4 p. 1943-1962
artikel
6 A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks Yousefpoor, Efat

14 4 p. 1917-1942
artikel
7 A machine learning-assisted data aggregation and offloading system for cloud–IoT communication Alfarraj, Osama

14 4 p. 2554-2564
artikel
8 Analysis of intrusion detection in cyber attacks using DEEP learning neural networks Kumar, Parasuraman

14 4 p. 2565-2584
artikel
9 Analysis of minimum distribution time of tit-for-tat-based P2P file distribution: Linear programming based approach Sasabe, Masahiro

14 4 p. 2127-2138
artikel
10 Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection Nirmal, K.

14 4 p. 2327-2339
artikel
11 An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment Ebinazer, Silambarasan Elkana

14 4 p. 2443-2451
artikel
12 An energy aware modified PAM clustering with cluster head modulation in Mobile cloud sensor environment Shene, S. Jeen

14 4 p. 2084-2098
artikel
13 Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing Li, Chunhai

14 4 p. 2099-2114
artikel
14 An optimistic technique to detect Cache based Side Channel attacks in Cloud Sangeetha, G.

14 4 p. 2473-2486
artikel
15 A novel clustering technique to stop congestion occur vehicular ad-hoc networks using node density based on received signal strength Regin, R.

14 4 p. 2361-2371
artikel
16 A novel energy-efficient data aggregation protocol for cognitive radio based wireless multimedia networks Babu, C. Rajesh

14 4 p. 2452-2461
artikel
17 A novel predicate based access control scheme for cloud environment using open stack swift storage Anilkumar, Chunduru

14 4 p. 2372-2384
artikel
18 Application of big data optimized clustering algorithm in cloud computing environment in traffic accident forecast Tian, Zhun

14 4 p. 2511-2523
artikel
19 A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust Rajesh, D.

14 4 p. 1976-1987
artikel
20 A self-localization range free protocol for wireless sensor networks Silmi, Souhila

14 4 p. 2061-2071
artikel
21 A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles Lai, Chengzhe

14 4 p. 2011-2025
artikel
22 A trust infrastructure based authentication method for clustered vehicular ad hoc networks Mirsadeghi, Fatemehsadat

14 4 p. 2537-2553
artikel
23 CAN bus network design of bifurcated power electric tractor Mengnan, Liu

14 4 p. 2306-2315
artikel
24 Correction to: A digital rights management system based on a scalable blockchain Garba, Abba

14 4 p. 1869
artikel
25 Delay - aware bandwidth estimation and intelligent video transcoder in mobile cloud Tamizhselvi, S.P.

14 4 p. 2038-2060
artikel
26 Dynamic intelligent resource allocation for emergency situations Zhi-xian, Chang

14 4 p. 2487-2494
artikel
27 Effective power allocation and distribution for 6 g – network in a box enabled peer to peer wireless communication networks Gnanavel, V. K.

14 4 p. 2351-2360
artikel
28 Efficient and privacy-preserving range-max query in fog-based agricultural IoT Zhou, Min

14 4 p. 2156-2170
artikel
29 Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems Xu, Chang

14 4 p. 1841-1853
artikel
30 Energy and delay-ware massive task scheduling in fog-cloud computing system Jia, Mengying

14 4 p. 2139-2155
artikel
31 Energy efficient and link reliable routing (E2LR) scheme for underwater sensor networks Tariq, Moeenuddin

14 4 p. 1870-1888
artikel
32 Energy efficient data correlation aware opportunistic routing protocol for wireless sensor networks Qin, Xu

14 4 p. 1963-1975
artikel
33 Epidemic and transmission priority based data dissemination model in vehichular adhoc networks (VANETs) Kumar, D. N. S. Ravi

14 4 p. 2524-2536
artikel
34 FAST: Fast Accessing Scheme for data Transmission in cloud computing Namasudra, Suyel

14 4 p. 2430-2442
artikel
35 High utility itemset mining using path encoding and constrained subset generation Javangula, Vamsinath

14 4 p. 2410-2418
artikel
36 Hybrid fuzzy logic and artificial Flora optimization algorithm-based two tier cluster head selection for improving energy efficiency in WSNs Anandkumar, Ramakrishnan

14 4 p. 2072-2083
artikel
37 Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks Deng, Lunzhi

14 4 p. 2236-2247
artikel
38 iForest: An informed resource search strategy in mobile P2P networks Zhou, Shuai

14 4 p. 1889-1904
artikel
39 Intelligent physical systems for strategic planning and management of enterprise information Ye, Changyou

14 4 p. 2501-2510
artikel
40 Joint offloading and energy optimization for wireless powered mobile edge computing under nonlinear EH Model Shi, Hua

14 4 p. 2248-2261
artikel
41 Joint optimization for throughput maximization in underwater acoustic networks with energy harvesting Liu, Zhixin

14 4 p. 2115-2126
artikel
42 MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud Yang, Xiaopeng

14 4 p. 2171-2186
artikel
43 MDRP: Message dissemination with re-route planning method for emergency vehicle information exchange Meenaakshi Sundhari, R. P.

14 4 p. 2285-2294
artikel
44 One radish, One hole: Specific adversarial training for enhancing neural network’s robustness Zhang, Yun

14 4 p. 2262-2274
artikel
45 P2P mobility management for seamless handover using D2D communication in B5G wireless technology Singh, Shubhanshi

14 4 p. 1988-1997
artikel
46 PriPresent: an embedded prime LightWeight block cipher for smart devices Girija, M.

14 4 p. 2462-2472
artikel
47 Privacy preserving E-voting cloud system based on ID based encryption Shankar, Achyut

14 4 p. 2399-2409
artikel
48 Radial kernelized regressive merkle–damgård cryptographic hash blockchain for secure data transmission with IoT sensor node N, Yuvaraj

14 4 p. 1998-2010
artikel
49 Reliable scheduling and load balancing for requests in cloud-fog computing Alqahtani, Fayez

14 4 p. 1905-1916
artikel
50 Research on wireless sensor location technology for biologic signal measuring based on intelligent bionic algorithm Jiang, Binbin

14 4 p. 2495-2500
artikel
51 RETRACTED ARTICLE: SPAHN novel approach for PL-AG gateway discovery for internet connectivity Kannan, K.

14 4 p. 2275-2284
artikel
52 Scalable aggregation plan (SAP) for portable network in a box (NIB) architecture Altameem, Torki

14 4 p. 2295-2305
artikel
53 Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions Preethi, D.

14 4 p. 2419-2429
artikel
54 SRAF: Scalable Resource Allocation Framework using Machine Learning in user-Centric Internet of Things Al-Makhadmeh, Zafer

14 4 p. 2340-2350
artikel
55 Traffic sign detection and recognition using RGSM and a novel feature extraction method Sudha, M.

14 4 p. 2026-2037
artikel
56 Transmission adaptive mode selection (TAMS) method for internet of things device energy management Al-Ma’aitah, Mohammed

14 4 p. 2316-2326
artikel
57 Tree-searching based trust assessment through communities in vehicular networks Li, Zhong

14 4 p. 1854-1868
artikel
                             57 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland