nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A critical analysis of RPL objective functions in internet of things paradigm
|
Gupta, Neeti |
|
|
14 |
4 |
p. 2187-2208 |
artikel |
2 |
Adaptive cost and energy aware secure peer-to-peer computational offloading in the edge-cloud enabled healthcare system
|
Jayaram, Ramaprabha |
|
|
14 |
4 |
p. 2209-2223 |
artikel |
3 |
A deep learning-based constrained intelligent routing method
|
Rao, Zheheng |
|
|
14 |
4 |
p. 2224-2235 |
artikel |
4 |
A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment
|
Rani, Deevi Radha |
|
|
14 |
4 |
p. 2385-2398 |
artikel |
5 |
A Grey-Wolf based Optimized Clustering approach to improve QoS in wireless sensor networks for IoT applications
|
Jaiswal, Kavita |
|
|
14 |
4 |
p. 1943-1962 |
artikel |
6 |
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks
|
Yousefpoor, Efat |
|
|
14 |
4 |
p. 1917-1942 |
artikel |
7 |
A machine learning-assisted data aggregation and offloading system for cloud–IoT communication
|
Alfarraj, Osama |
|
|
14 |
4 |
p. 2554-2564 |
artikel |
8 |
Analysis of intrusion detection in cyber attacks using DEEP learning neural networks
|
Kumar, Parasuraman |
|
|
14 |
4 |
p. 2565-2584 |
artikel |
9 |
Analysis of minimum distribution time of tit-for-tat-based P2P file distribution: Linear programming based approach
|
Sasabe, Masahiro |
|
|
14 |
4 |
p. 2127-2138 |
artikel |
10 |
Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection
|
Nirmal, K. |
|
|
14 |
4 |
p. 2327-2339 |
artikel |
11 |
An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment
|
Ebinazer, Silambarasan Elkana |
|
|
14 |
4 |
p. 2443-2451 |
artikel |
12 |
An energy aware modified PAM clustering with cluster head modulation in Mobile cloud sensor environment
|
Shene, S. Jeen |
|
|
14 |
4 |
p. 2084-2098 |
artikel |
13 |
Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing
|
Li, Chunhai |
|
|
14 |
4 |
p. 2099-2114 |
artikel |
14 |
An optimistic technique to detect Cache based Side Channel attacks in Cloud
|
Sangeetha, G. |
|
|
14 |
4 |
p. 2473-2486 |
artikel |
15 |
A novel clustering technique to stop congestion occur vehicular ad-hoc networks using node density based on received signal strength
|
Regin, R. |
|
|
14 |
4 |
p. 2361-2371 |
artikel |
16 |
A novel energy-efficient data aggregation protocol for cognitive radio based wireless multimedia networks
|
Babu, C. Rajesh |
|
|
14 |
4 |
p. 2452-2461 |
artikel |
17 |
A novel predicate based access control scheme for cloud environment using open stack swift storage
|
Anilkumar, Chunduru |
|
|
14 |
4 |
p. 2372-2384 |
artikel |
18 |
Application of big data optimized clustering algorithm in cloud computing environment in traffic accident forecast
|
Tian, Zhun |
|
|
14 |
4 |
p. 2511-2523 |
artikel |
19 |
A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust
|
Rajesh, D. |
|
|
14 |
4 |
p. 1976-1987 |
artikel |
20 |
A self-localization range free protocol for wireless sensor networks
|
Silmi, Souhila |
|
|
14 |
4 |
p. 2061-2071 |
artikel |
21 |
A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles
|
Lai, Chengzhe |
|
|
14 |
4 |
p. 2011-2025 |
artikel |
22 |
A trust infrastructure based authentication method for clustered vehicular ad hoc networks
|
Mirsadeghi, Fatemehsadat |
|
|
14 |
4 |
p. 2537-2553 |
artikel |
23 |
CAN bus network design of bifurcated power electric tractor
|
Mengnan, Liu |
|
|
14 |
4 |
p. 2306-2315 |
artikel |
24 |
Correction to: A digital rights management system based on a scalable blockchain
|
Garba, Abba |
|
|
14 |
4 |
p. 1869 |
artikel |
25 |
Delay - aware bandwidth estimation and intelligent video transcoder in mobile cloud
|
Tamizhselvi, S.P. |
|
|
14 |
4 |
p. 2038-2060 |
artikel |
26 |
Dynamic intelligent resource allocation for emergency situations
|
Zhi-xian, Chang |
|
|
14 |
4 |
p. 2487-2494 |
artikel |
27 |
Effective power allocation and distribution for 6 g – network in a box enabled peer to peer wireless communication networks
|
Gnanavel, V. K. |
|
|
14 |
4 |
p. 2351-2360 |
artikel |
28 |
Efficient and privacy-preserving range-max query in fog-based agricultural IoT
|
Zhou, Min |
|
|
14 |
4 |
p. 2156-2170 |
artikel |
29 |
Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems
|
Xu, Chang |
|
|
14 |
4 |
p. 1841-1853 |
artikel |
30 |
Energy and delay-ware massive task scheduling in fog-cloud computing system
|
Jia, Mengying |
|
|
14 |
4 |
p. 2139-2155 |
artikel |
31 |
Energy efficient and link reliable routing (E2LR) scheme for underwater sensor networks
|
Tariq, Moeenuddin |
|
|
14 |
4 |
p. 1870-1888 |
artikel |
32 |
Energy efficient data correlation aware opportunistic routing protocol for wireless sensor networks
|
Qin, Xu |
|
|
14 |
4 |
p. 1963-1975 |
artikel |
33 |
Epidemic and transmission priority based data dissemination model in vehichular adhoc networks (VANETs)
|
Kumar, D. N. S. Ravi |
|
|
14 |
4 |
p. 2524-2536 |
artikel |
34 |
FAST: Fast Accessing Scheme for data Transmission in cloud computing
|
Namasudra, Suyel |
|
|
14 |
4 |
p. 2430-2442 |
artikel |
35 |
High utility itemset mining using path encoding and constrained subset generation
|
Javangula, Vamsinath |
|
|
14 |
4 |
p. 2410-2418 |
artikel |
36 |
Hybrid fuzzy logic and artificial Flora optimization algorithm-based two tier cluster head selection for improving energy efficiency in WSNs
|
Anandkumar, Ramakrishnan |
|
|
14 |
4 |
p. 2072-2083 |
artikel |
37 |
Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks
|
Deng, Lunzhi |
|
|
14 |
4 |
p. 2236-2247 |
artikel |
38 |
iForest: An informed resource search strategy in mobile P2P networks
|
Zhou, Shuai |
|
|
14 |
4 |
p. 1889-1904 |
artikel |
39 |
Intelligent physical systems for strategic planning and management of enterprise information
|
Ye, Changyou |
|
|
14 |
4 |
p. 2501-2510 |
artikel |
40 |
Joint offloading and energy optimization for wireless powered mobile edge computing under nonlinear EH Model
|
Shi, Hua |
|
|
14 |
4 |
p. 2248-2261 |
artikel |
41 |
Joint optimization for throughput maximization in underwater acoustic networks with energy harvesting
|
Liu, Zhixin |
|
|
14 |
4 |
p. 2115-2126 |
artikel |
42 |
MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud
|
Yang, Xiaopeng |
|
|
14 |
4 |
p. 2171-2186 |
artikel |
43 |
MDRP: Message dissemination with re-route planning method for emergency vehicle information exchange
|
Meenaakshi Sundhari, R. P. |
|
|
14 |
4 |
p. 2285-2294 |
artikel |
44 |
One radish, One hole: Specific adversarial training for enhancing neural network’s robustness
|
Zhang, Yun |
|
|
14 |
4 |
p. 2262-2274 |
artikel |
45 |
P2P mobility management for seamless handover using D2D communication in B5G wireless technology
|
Singh, Shubhanshi |
|
|
14 |
4 |
p. 1988-1997 |
artikel |
46 |
PriPresent: an embedded prime LightWeight block cipher for smart devices
|
Girija, M. |
|
|
14 |
4 |
p. 2462-2472 |
artikel |
47 |
Privacy preserving E-voting cloud system based on ID based encryption
|
Shankar, Achyut |
|
|
14 |
4 |
p. 2399-2409 |
artikel |
48 |
Radial kernelized regressive merkle–damgård cryptographic hash blockchain for secure data transmission with IoT sensor node
|
N, Yuvaraj |
|
|
14 |
4 |
p. 1998-2010 |
artikel |
49 |
Reliable scheduling and load balancing for requests in cloud-fog computing
|
Alqahtani, Fayez |
|
|
14 |
4 |
p. 1905-1916 |
artikel |
50 |
Research on wireless sensor location technology for biologic signal measuring based on intelligent bionic algorithm
|
Jiang, Binbin |
|
|
14 |
4 |
p. 2495-2500 |
artikel |
51 |
RETRACTED ARTICLE: SPAHN novel approach for PL-AG gateway discovery for internet connectivity
|
Kannan, K. |
|
|
14 |
4 |
p. 2275-2284 |
artikel |
52 |
Scalable aggregation plan (SAP) for portable network in a box (NIB) architecture
|
Altameem, Torki |
|
|
14 |
4 |
p. 2295-2305 |
artikel |
53 |
Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions
|
Preethi, D. |
|
|
14 |
4 |
p. 2419-2429 |
artikel |
54 |
SRAF: Scalable Resource Allocation Framework using Machine Learning in user-Centric Internet of Things
|
Al-Makhadmeh, Zafer |
|
|
14 |
4 |
p. 2340-2350 |
artikel |
55 |
Traffic sign detection and recognition using RGSM and a novel feature extraction method
|
Sudha, M. |
|
|
14 |
4 |
p. 2026-2037 |
artikel |
56 |
Transmission adaptive mode selection (TAMS) method for internet of things device energy management
|
Al-Ma’aitah, Mohammed |
|
|
14 |
4 |
p. 2316-2326 |
artikel |
57 |
Tree-searching based trust assessment through communities in vehicular networks
|
Li, Zhong |
|
|
14 |
4 |
p. 1854-1868 |
artikel |