nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A delay-constrained node-disjoint multipath routing in software-defined vehicular networks
|
MalekiTabar, Mahsa |
|
|
15 |
3 |
p. 1452-1472 |
artikel |
2 |
A localization and deployment model for wireless sensor networks using arithmetic optimization algorithm
|
Bhat, Soumya J |
|
|
15 |
3 |
p. 1473-1485 |
artikel |
3 |
An authentication and key agreement scheme for smart grid
|
Safkhani, Masoumeh |
|
|
15 |
3 |
p. 1595-1616 |
artikel |
4 |
An effective LS-SVM/AKF aided SINS/DVL integrated navigation system for underwater vehicles
|
Sun, Jin |
|
|
15 |
3 |
p. 1437-1451 |
artikel |
5 |
An optimal deployment scheme for extremely fast charging stations
|
Zhong, Ping |
|
|
15 |
3 |
p. 1486-1504 |
artikel |
6 |
A novel manufacturing service model transformation method based on product lifecycle
|
Ding, Tao |
|
|
15 |
3 |
p. 1638-1652 |
artikel |
7 |
A privacy-preserving and efficient byzantine consensus through multi-signature with ring
|
Wu, Xiaohua |
|
|
15 |
3 |
p. 1669-1684 |
artikel |
8 |
BCAV: Blockchain-based certificateless authentication system for vehicular network
|
Tomar, Ashish |
|
|
15 |
3 |
p. 1733-1756 |
artikel |
9 |
Bitrans: A bidirectional and trusted data transaction protocol based on the blockchain system
|
Huang, Gen |
|
|
15 |
3 |
p. 1311-1327 |
artikel |
10 |
Blockchain-based access control for dynamic device management in microgrid
|
Zhang, Kai |
|
|
15 |
3 |
p. 1653-1668 |
artikel |
11 |
EDPPA: An efficient distance-based privacy preserving authentication protocol in VANET
|
Ren, Jin |
|
|
15 |
3 |
p. 1385-1397 |
artikel |
12 |
Efficient broadcast scheduling at mobile cloud edges for supporting news-broadcast-on-demand over P2P streaming
|
Tong, Sheau-Ru |
|
|
15 |
3 |
p. 1345-1356 |
artikel |
13 |
Fault-Tolerant indoor localization based on speed conscious recurrent neural network using Kullback–Leibler divergence
|
Varma, Pothuri Surendra |
|
|
15 |
3 |
p. 1370-1384 |
artikel |
14 |
GE-IDS: an intrusion detection system based on grayscale and entropy
|
Liao, Dan |
|
|
15 |
3 |
p. 1521-1534 |
artikel |
15 |
HeadSee: Device-free head gesture recognition with commodity RFID
|
Chen, Kai |
|
|
15 |
3 |
p. 1357-1369 |
artikel |
16 |
Information transmission mode and IoT community reconstruction based on user influence in opportunistic s ocial networks
|
Wu, Jia |
|
|
15 |
3 |
p. 1398-1416 |
artikel |
17 |
Interference-Free Source Deployment for Coverage in Underwater Acoustic Backscatter Networks
|
Bereketli, Alper |
|
|
15 |
3 |
p. 1577-1594 |
artikel |
18 |
Multi agent dynamic weight based cluster trust estimation for hierarchical wireless sensor networks
|
Das, Rahul |
|
|
15 |
3 |
p. 1505-1520 |
artikel |
19 |
Multi-metric optimization with a new metaheuristic approach developed for 3D deployment of multiple drone-BSs
|
Ozdag, Recep |
|
|
15 |
3 |
p. 1535-1561 |
artikel |
20 |
Particle swarm optimization based sleep scheduling and clustering protocol in wireless sensor network
|
Rawat, Piyush |
|
|
15 |
3 |
p. 1417-1436 |
artikel |
21 |
QoS-aware resource allocation in mobile edge computing networks: Using intelligent offloading and caching strategy
|
Jalilvand Aghdam Bonab, Mohammad |
|
|
15 |
3 |
p. 1328-1344 |
artikel |
22 |
Reinforcement-Learning based energy efficient optimized routing protocol for WSN
|
Keerthika, A. |
|
|
15 |
3 |
p. 1685-1704 |
artikel |
23 |
Resource allocation and optimization in D2D communication with PDRAPC framework
|
Babu, Alapaka Nagur |
|
|
15 |
3 |
p. 1617-1637 |
artikel |
24 |
RFDCS: A reactive fault detection and classification scheme for clustered wsns
|
Choudhary, Ankur |
|
|
15 |
3 |
p. 1705-1732 |
artikel |
25 |
Secure medical data sharing scheme based on traceable ring signature and blockchain
|
Lai, Chengzhe |
|
|
15 |
3 |
p. 1562-1576 |
artikel |