nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A hybrid approach towards reduced checkpointing overhead in cloud-based applications
|
Sinha, Bharati |
|
|
15 |
1 |
p. 473-483 |
artikel |
2 |
Analytical modelling of false blocking problem in wireless ad hoc networks
|
Chong, Wai Kheong |
|
|
15 |
1 |
p. 221-245 |
artikel |
3 |
An autonomous intrusion detection system for the RPL protocol
|
Shirafkan, Mohammad |
|
|
15 |
1 |
p. 484-502 |
artikel |
4 |
An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system
|
Chen, Yulei |
|
|
15 |
1 |
p. 516-528 |
artikel |
5 |
A new fog-based routing strategy (FBRS) for vehicular ad-hoc networks
|
El Gayyar, Khaled S. |
|
|
15 |
1 |
p. 386-407 |
artikel |
6 |
An improved k-angle coverage algorithm for multimedia wireless sensor networks based on two-layer tabu search
|
Wu, Huarui |
|
|
15 |
1 |
p. 28-44 |
artikel |
7 |
An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy
|
Yang, Guang |
|
|
15 |
1 |
p. 503-515 |
artikel |
8 |
An intelligent traffic prediction framework for 5G network using SDN and fusion learning
|
Selvi, K. Tamil |
|
|
15 |
1 |
p. 751-767 |
artikel |
9 |
An OLSR-based Geocast Routing Protocol for Vehicular Ad Hoc Networks
|
Kachooei, Maryam Ataei |
|
|
15 |
1 |
p. 246-266 |
artikel |
10 |
An optimal load balancing strategy for P2P network using chicken swarm optimization
|
Kumar, Dharmendra |
|
|
15 |
1 |
p. 666-688 |
artikel |
11 |
A novel hierarchical fault management framework for wireless sensor networks: HFMF
|
Moridi, Elham |
|
|
15 |
1 |
p. 45-55 |
artikel |
12 |
An uneven annulus sector grid-based energy-efficient multi-hop routing protocol for wireless sensor networks
|
Huang, Jianhua |
|
|
15 |
1 |
p. 559-575 |
artikel |
13 |
Application-aware QoS routing in SDNs using machine learning techniques
|
Zheng, Weichang |
|
|
15 |
1 |
p. 529-548 |
artikel |
14 |
AToM: Active topology monitoring for the bitcoin peer-to-peer network
|
Franzoni, Federico |
|
|
15 |
1 |
p. 408-425 |
artikel |
15 |
A trust based energy and mobility aware routing protocol to improve infotainment services in VANETs
|
Shafi, Shaik |
|
|
15 |
1 |
p. 576-591 |
artikel |
16 |
A two-phase fuzzy based access network selection scheme for vehicular ad hoc networks
|
Evangeline, C. Suganthi |
|
|
15 |
1 |
p. 107-133 |
artikel |
17 |
BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property
|
Zhuang, Chuxin |
|
|
15 |
1 |
p. 724-738 |
artikel |
18 |
Big data analytics for critical information classification in online social networks using classifier chains
|
Silva, Douglas H. |
|
|
15 |
1 |
p. 626-641 |
artikel |
19 |
Cloudlet deployment for workflow applications in a mobile edge computing-wireless metropolitan area network
|
Zhao, Xu |
|
|
15 |
1 |
p. 739-750 |
artikel |
20 |
Clover: An anonymous transaction relay protocol for the bitcoin P2P network
|
Franzoni, Federico |
|
|
15 |
1 |
p. 290-303 |
artikel |
21 |
Clustered NOMA-based downlink adaptive relay coordinated transmission scheme for future 6G cell-free edge network
|
Peng, Xuefei |
|
|
15 |
1 |
p. 612-625 |
artikel |
22 |
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols
|
Guo, Guanglai |
|
|
15 |
1 |
p. 304-323 |
artikel |
23 |
Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection
|
Thakur, Vidyotma |
|
|
15 |
1 |
p. 206-220 |
artikel |
24 |
Decentralized access control technique with multi-tier authentication of user for cloud storage
|
Shiny, S. |
|
|
15 |
1 |
p. 13-27 |
artikel |
25 |
Deep action: A mobile action recognition framework using edge offloading
|
Zhang, Deyu |
|
|
15 |
1 |
p. 324-339 |
artikel |
26 |
Determination of energy efficient optimal sojourn location of mobile sinks in clustered corona-based wireless sensor networks
|
K, Mohaideen Pitchai |
|
|
15 |
1 |
p. 1-12 |
artikel |
27 |
Developing a novel methodology for virtual machine introspection to classify unknown malware functions
|
Vaza, Rahul N. |
|
|
15 |
1 |
p. 793-810 |
artikel |
28 |
Distributed Address Table (DAT): A Decentralized Model for End-to-End Communication in IoT
|
Alshawki, Mohammed B. |
|
|
15 |
1 |
p. 178-193 |
artikel |
29 |
Double agents-DQL based D2D computing-offloading for SHVC
|
Liu, Jianlong |
|
|
15 |
1 |
p. 56-76 |
artikel |
30 |
Efficient path-sense transmission based on IoT system in opportunistic social networks
|
Li, Xiaoli |
|
|
15 |
1 |
p. 811-826 |
artikel |
31 |
Efficient topology control of blockchain peer to peer network based on SDN paradigm
|
Deshpande, Varun |
|
|
15 |
1 |
p. 267-289 |
artikel |
32 |
EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things
|
Bang, A. O. |
|
|
15 |
1 |
p. 642-665 |
artikel |
33 |
Enabling rank-based distribution of microservices among containers for green cloud computing environment
|
Saboor, Abdul |
|
|
15 |
1 |
p. 77-91 |
artikel |
34 |
Energy aware MAC protocol with mobility management in wireless body area network
|
Dhanvijay, Mrinai Maneetkumar |
|
|
15 |
1 |
p. 426-443 |
artikel |
35 |
Fuzzy routing for in-network aggregation in wireless sensor networks
|
Maivizhi, Radhakrishnan |
|
|
15 |
1 |
p. 592-611 |
artikel |
36 |
Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems
|
Chen, Zheyi |
|
|
15 |
1 |
p. 194-205 |
artikel |
37 |
Joint pricing and task allocation for blockchain empowered crowd spectrum sensing
|
Chen, Wenbin |
|
|
15 |
1 |
p. 783-792 |
artikel |
38 |
Joint resource allocation for QoE optimization in large-scale NOMA-enabled multi-cell networks
|
Jia, Jie |
|
|
15 |
1 |
p. 689-702 |
artikel |
39 |
LocTrust: A local and global consensus-combined trust model in MANETs
|
Zhou, Shuai |
|
|
15 |
1 |
p. 355-368 |
artikel |
40 |
Machine-learning-based cache partition method in cloud environment
|
Qiu, Jiefan |
|
|
15 |
1 |
p. 149-162 |
artikel |
41 |
MINAD: Multi-inputs Neural Network based on Application Structure for Android Malware Detection
|
Nguyen, Duc V. |
|
|
15 |
1 |
p. 163-177 |
artikel |
42 |
MPLDS: An integration of CP-ABE and local differential privacy for achieving multiple privacy levels data sharing
|
Song, Haina |
|
|
15 |
1 |
p. 369-385 |
artikel |
43 |
Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles
|
Benarous, Leila |
|
|
15 |
1 |
p. 461-472 |
artikel |
44 |
Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment
|
Jeniffer, J. Thresa |
|
|
15 |
1 |
p. 703-723 |
artikel |
45 |
Privacy-preserving comparison based data aggregation protocols for mobile sensing
|
Liu, Weinan |
|
|
15 |
1 |
p. 549-558 |
artikel |
46 |
Reducing the number of transaction messages in bitcoin
|
Mišić, Vojislav B. |
|
|
15 |
1 |
p. 768-782 |
artikel |
47 |
Robustness against fraudulent activities of a blockchain-based online review system
|
Karode, Tanakorn |
|
|
15 |
1 |
p. 92-106 |
artikel |
48 |
SCMP-V: A secure multiple relays cooperative downloading scheme with privacy preservation in VANETs
|
Liu, Xuejiao |
|
|
15 |
1 |
p. 340-354 |
artikel |
49 |
The reliable routing for software-defined vehicular networks towards beyond 5G
|
Lu, Yaoguang |
|
|
15 |
1 |
p. 134-148 |
artikel |
50 |
Towards intelligent P2P IPTV overlay management through classification of peers
|
Ali, Muhammad |
|
|
15 |
1 |
p. 827-838 |
artikel |
51 |
Trusted resource allocation based on proof-of-reputation consensus mechanism for edge computing
|
Hu, Qiaohong |
|
|
15 |
1 |
p. 444-460 |
artikel |