nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-based cyber-security for connected networks
|
choudhary, Deepak |
|
|
16 |
4 |
p. 1852-1867 |
artikel |
2 |
A composite blockchain associated event traceability method for financial activities
|
Wang, Junlu |
|
|
16 |
4 |
p. 1696-1715 |
artikel |
3 |
ADAS: Adaptive Delay-Aligned Scheduling for Multipath Transmission in Heterogeneous Wireless Networks
|
Chen, Du |
|
|
16 |
4 |
p. 1583-1595 |
artikel |
4 |
A Lightweight authentication approach based on linear feedback shift register and majority function for internet of things
|
Ebrahimpour, Elham |
|
|
16 |
4 |
p. 1900-1915 |
artikel |
5 |
A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System
|
Kumar Chaudhary, Ravi Raushan |
|
|
16 |
4 |
p. 1975-1992 |
artikel |
6 |
Anomaly traffic detection based on feature fluctuation for secure industrial internet of things
|
Yin, Jie |
|
|
16 |
4 |
p. 1680-1695 |
artikel |
7 |
An optimal model for enhancing network lifetime and cluster head selection using hybrid snake whale optimization
|
Samiayya, Duraimurugan |
|
|
16 |
4 |
p. 1959-1974 |
artikel |
8 |
A novel raccoon optimization algorithm with multi-objective clustering strategy based routing protocol for WSNs
|
Bourebia, Nour El Houda |
|
|
16 |
4 |
p. 1624-1640 |
artikel |
9 |
A RSS-based path loss model approaches multi-dimensional scaling to localize 2D sensor nodes in WSN
|
Rayar, Vijay |
|
|
16 |
4 |
p. 1609-1623 |
artikel |
10 |
A searchable encryption scheme with hidden search pattern and access pattern on distributed cloud system
|
Duan, Shengchen |
|
|
16 |
4 |
p. 1716-1738 |
artikel |
11 |
A task allocation method based on data fusion of multimodal trajectory in mobile crowd sensing
|
Liu, Jia |
|
|
16 |
4 |
p. 1944-1958 |
artikel |
12 |
Bit flipping attack detection in low power wide area networks using a deep learning approach
|
Alizadeh, Faezeh |
|
|
16 |
4 |
p. 1916-1926 |
artikel |
13 |
Enhanced Elman Spike Neural Network fostered intrusion detection framework for securing wireless sensor network
|
Sarath Kumar, R. |
|
|
16 |
4 |
p. 1819-1833 |
artikel |
14 |
ERNSS-MCC: Efficient relay node selection scheme for mission critical communication using machine learning in VANET
|
Monisha, A. Anu |
|
|
16 |
4 |
p. 1761-1784 |
artikel |
15 |
Integrating the edge intelligence technology into image composition: A case study
|
Yuan, Peiyan |
|
|
16 |
4 |
p. 1641-1651 |
artikel |
16 |
IoT intrusion detection model based on gated recurrent unit and residual network
|
Zhao, Guosheng |
|
|
16 |
4 |
p. 1887-1899 |
artikel |
17 |
Joint task assignment and path planning for truck and drones in mobile crowdsensing
|
Wang, Zijia |
|
|
16 |
4 |
p. 1668-1679 |
artikel |
18 |
LoRa network communication protocol based on location and time planning
|
Xuewen, He |
|
|
16 |
4 |
p. 1596-1608 |
artikel |
19 |
MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain
|
Yu, Bei |
|
|
16 |
4 |
p. 1927-1943 |
artikel |
20 |
Parked vehicles crowdsourcing for task offloading in vehicular edge computing
|
Zeng, Feng |
|
|
16 |
4 |
p. 1803-1818 |
artikel |
21 |
χperbp: a cloud-based lightweight mutual authentication protocol
|
Adeli, Morteza |
|
|
16 |
4 |
p. 1785-1802 |
artikel |
22 |
Quality of service aware routing in software defined video streaming: a survey
|
Paramasivam, Suguna |
|
|
16 |
4 |
p. 1739-1760 |
artikel |
23 |
SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance
|
Li, Tao |
|
|
16 |
4 |
p. 1652-1667 |
artikel |
24 |
TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization
|
Sivamohan, S. |
|
|
16 |
4 |
p. 1993-2021 |
artikel |
25 |
Towards verifiable and privacy-preserving account model on a consortium blockchain based on zk-SNARKs
|
Hu, Xiaoyan |
|
|
16 |
4 |
p. 1834-1851 |
artikel |
26 |
TRP: A TOPSIS-based RSU-enabled priority scheduling scheme to disseminate alert messages of WBAN sensors in hybrid VANETs
|
Bhabani, Bidisha |
|
|
16 |
4 |
p. 1868-1886 |
artikel |