Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             21 results found
no title author magazine year volume issue page(s) type
1 A blockchain and stacked machine learning approach for malicious nodes’ detection in internet of things Musa Baig, Shakira

16 6 p. 2811-2832
article
2 A comparative study of IP-based and ICN-based link-state routing protocols in LEO satellite networks Yan, Fei

16 6 p. 3032-3046
article
3 A lightweight block encryption algorithm for narrowband internet of things Zhao, Guosheng

16 6 p. 2775-2793
article
4 An improved Caledonian crow learning algorithm based on ring topology for security-aware workflow scheduling in cloud computing Zade, B. Mohammad Hasani

16 6 p. 2929-2984
article
5 An intelligent sleep-awake energy management system for wireless sensor network Vellela, Sai Srinivas

16 6 p. 2714-2731
article
6 Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation Xue, Jingting

16 6 p. 2761-2774
article
7 A novel energy-efficient adaptive superframe structure for OWC-based real-time bio-sensor networks Bhutani, Monica

16 6 p. 3021-3031
article
8 A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network Rao, Meena

16 6 p. 2794-2810
article
9 Blockchain-based technology for commerce data management using reputation algorithm with QoS mechanism Zhu, Haohua

16 6 p. 2732-2746
article
10 Block chain based trusted distributed routing scheme using optimized dropout ensemble extreme learning neural network in MANET Krishnakumar, V.

16 6 p. 2696-2713
article
11 BW-PBFT: Practical byzantine fault tolerance consensus algorithm based on credit bidirectionally waning Wang, Zhen-Fei

16 6 p. 2915-2928
article
12 Cluster head based secure routing using optimized dual-discriminator conditional generative adversarial network in wireless ad-hoc networks Prabha, R.

16 6 p. 2747-2760
article
13 EVONChain: a bi-tiered public blockchain network architecture Kong, Yihan

16 6 p. 2892-2914
article
14 FIBPRO: Peer-to-peer data management and sharing cloud storage system based on blockchain Han, Rui

16 6 p. 2850-2864
article
15 Joint DNN partitioning and resource allocation for completion rate maximization of delay-aware DNN inference tasks in wireless powered mobile edge computing Tian, Xianzhong

16 6 p. 2865-2878
article
16 Joint optimization of energy and delay for computation offloading in vehicular edge computing Tang, Bing

16 6 p. 2681-2695
article
17 Joint optimization of IoT devices access and bandwidth resource allocation for network slicing in edge-enabled radio access networks Zhang, Jianshan

16 6 p. 2879-2891
article
18 Online resource allocation for QoE optimization in CoMP-assisted eMBMS system Chen, Jian

16 6 p. 2667-2680
article
19 Predicting functional roles of Ethereum blockchain addresses Saleem, Tania

16 6 p. 2985-3002
article
20 Smartcontractchain (SC2): Cross-ISP QoS traffic management framework with SDN and blockchain Karakus, Murat

16 6 p. 3003-3020
article
21 Wormhole attack detection and recovery for secure range free localization in large-scale wireless sensor networks Garg, Ruchi

16 6 p. 2833-2849
article
                             21 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands