nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A bio-inspired adaptive junction-based routing protocol for VANETs
|
Azzoug, Youcef |
|
|
17 |
3 |
p. 1103-1137 |
artikel |
2 |
A blockchain based lightweight and secure access control framework for IoT-enabled supply chain
|
Raj, Rashmi |
|
|
17 |
3 |
p. 1610-1630 |
artikel |
3 |
A blockchain-based platform for decentralized trusted computing
|
Liang, Yihuai |
|
|
17 |
3 |
p. 1499-1513 |
artikel |
4 |
Access control mechanism in distributed smart power plants based on blockchain and ciphertext updatable functional encryption
|
Zhou, Yizhe |
|
|
17 |
3 |
p. 1021-1035 |
artikel |
5 |
A comprehensive survey on communication techniques for the realization of intelligent transportation systems in IoT based smart cities
|
Rajkumar, Y. |
|
|
17 |
3 |
p. 1263-1308 |
artikel |
6 |
A green computing method for encrypted IoT traffic recognition based on traffic fingerprint graphs
|
Li, Yao |
|
|
17 |
3 |
p. 1514-1526 |
artikel |
7 |
A lightweight privacy preserving distributed certificate-less aggregate based mutual authentication scheme for vehicular adhoc networks
|
Rajkumar, Y. |
|
|
17 |
3 |
p. 1442-1466 |
artikel |
8 |
An enhanced asynchronous advantage actor-critic-based algorithm for performance optimization in mobile edge computing -enabled internet of vehicles networks
|
Moghaddasi, Komeil |
|
|
17 |
3 |
p. 1169-1189 |
artikel |
9 |
A new method of network traffic prediction based on combination model
|
Li, Guohao |
|
|
17 |
3 |
p. 1075-1090 |
artikel |
10 |
An improved salp swarm algorithm for solving node coverage optimization problem in WSN
|
Wang, Jiaming |
|
|
17 |
3 |
p. 1091-1102 |
artikel |
11 |
A novel approach to alleviate wealth compounding in proof-of-stake cryptocurrencies
|
Naderi, Zahra |
|
|
17 |
3 |
p. 1335-1343 |
artikel |
12 |
A personalized and efficient EMR sharing and management scheme based on smart contracts
|
Yang, Xiaohui |
|
|
17 |
3 |
p. 1569-1587 |
artikel |
13 |
ARGCN: An intelligent prediction model for SDN network performance
|
Ma, Bo |
|
|
17 |
3 |
p. 1422-1441 |
artikel |
14 |
ARSL-V: A risk-aware relay selection scheme using reinforcement learning in VANETs
|
Liu, Xuejiao |
|
|
17 |
3 |
p. 1750-1767 |
artikel |
15 |
A smart Iot-based waste management system using vehicle shortest path routing and trashcan visiting decision making based on deep convolutional neural network
|
Kona, V V Satyanarayana |
|
|
17 |
3 |
p. 1051-1074 |
artikel |
16 |
A UAV aided lightweight target information collection and detection approach
|
Huang, Meng |
|
|
17 |
3 |
p. 1667-1681 |
artikel |
17 |
Centralized and distributed approaches of Artificial Bee Colony algorithm and Delaunay Triangulation for the coverage in IoT networks
|
Abdallah, Wajih |
|
|
17 |
3 |
p. 1377-1402 |
artikel |
18 |
Cluster based hybrid optimization and kronecker gradient factored approximate optimum path curvature network for energy efficiency routing in WSN
|
Jamaesha, S. Syed |
|
|
17 |
3 |
p. 1588-1609 |
artikel |
19 |
Consortium blockchain-based secure cross-operator V2V video content distribution
|
Shen, Hang |
|
|
17 |
3 |
p. 1631-1644 |
artikel |
20 |
Deep learning-based power usage effectiveness optimization for IoT-enabled data center
|
Sun, Yu |
|
|
17 |
3 |
p. 1702-1719 |
artikel |
21 |
Developing a novel blockchain-based vaccine tracking and certificate system: An end-to-end approach
|
Masood, Faraz |
|
|
17 |
3 |
p. 1358-1376 |
artikel |
22 |
Edge-assisted and energy-efficient access control for dynamic users group in smart grids
|
Xiao, Peng |
|
|
17 |
3 |
p. 1149-1157 |
artikel |
23 |
Efficient energy consumption and fault tolerant method for clustering and reliable routing in wireless sensor network
|
Yadawad, Shreedhar |
|
|
17 |
3 |
p. 1552-1568 |
artikel |
24 |
Efficient hybrid resource allocation for uplink and downlink device-to-device underlay communication in 5G and beyond wireless networks
|
Gopal, Malle |
|
|
17 |
3 |
p. 1791-1811 |
artikel |
25 |
Energy efficient noise error pattern generator for guessing decoding in bursty channels
|
Zhou, Qiang |
|
|
17 |
3 |
p. 1225-1236 |
artikel |
26 |
Enhancing intrusion detection using wireless sensor networks: A novel ahp-madm aggregated multiple type 3 fuzzy logic-based k-barriers prediction system
|
Tarafdar, Anirban |
|
|
17 |
3 |
p. 1732-1749 |
artikel |
27 |
Enterprise Composite Blockchain Double Layer Consensus Algorithm Based on Improved DPoS and BFT
|
Li, Su |
|
|
17 |
3 |
p. 1682-1701 |
artikel |
28 |
Extreme learning machine optimized by artificial cell swarm optimization for the data fusion modal in WSNs
|
Govindaraj, Shanthi |
|
|
17 |
3 |
p. 1344-1357 |
artikel |
29 |
IGWOA: Improved Grey Wolf optimization algorithm for resource scheduling in cloud-fog environment for delay-sensitive applications
|
Goel, Gaurav |
|
|
17 |
3 |
p. 1768-1790 |
artikel |
30 |
Intelligent energy efficient routing in wireless body area network with mobile sink nodes using horse electric fish optimization
|
Anirudh Reddy, R. |
|
|
17 |
3 |
p. 1527-1551 |
artikel |
31 |
Intrusion detection system extended CNN and artificial bee colony optimization in wireless sensor networks
|
Yesodha, K. |
|
|
17 |
3 |
p. 1237-1262 |
artikel |
32 |
Lightweight privacy-enhanced secure data sharing scheme for smart grid
|
Yang, Zheng |
|
|
17 |
3 |
p. 1322-1334 |
artikel |
33 |
Network lifetime optimization and route selection strategy towards energy enrichment in wireless body area networks
|
Pradeep, R. |
|
|
17 |
3 |
p. 1158-1168 |
artikel |
34 |
Node selection for model quality optimization in hierarchical federated learning based on deep reinforcement learning
|
Li, Zhuo |
|
|
17 |
3 |
p. 1720-1731 |
artikel |
35 |
Probabilistic intrusion detection based on an optimal strong K-barrier strategy in WSNs
|
Boualem, Adda |
|
|
17 |
3 |
p. 1190-1207 |
artikel |
36 |
Public key authenticated encryption with field-free subset conjunctive and disjunctive keyword search against keyword guessing attacks
|
Chenam, Venkata Bhikshapathi |
|
|
17 |
3 |
p. 1036-1050 |
artikel |
37 |
Secure and flexible authorized data sharing for smart grid
|
Feng, Yawen |
|
|
17 |
3 |
p. 1208-1224 |
artikel |
38 |
Security-aware IoT botnet attack detection framework using dilated and cascaded deep learning mechanism with conditional adversarial autoencoder-based features
|
Sakthipriya, N. |
|
|
17 |
3 |
p. 1467-1485 |
artikel |
39 |
Sybil attack detection in ultra-dense VANETs using verifiable delay functions
|
Rajendra, Yuvaraj |
|
|
17 |
3 |
p. 1645-1666 |
artikel |
40 |
T-AODV: A trust-based routing against black-hole attacks in VANETs
|
Honarmand, Farnam |
|
|
17 |
3 |
p. 1309-1321 |
artikel |
41 |
Traffic modelling in stratospheric drone-assisted VANET
|
Kharchenko, Volodymyr |
|
|
17 |
3 |
p. 1138-1148 |
artikel |
42 |
Trust-based clustering and routing in WSNs using DST-WOA
|
Singh, Shashank |
|
|
17 |
3 |
p. 1486-1498 |
artikel |
43 |
Voice over WiFi cell capacity enhancement using A-MPDU frame aggregation in WLAN standard
|
Chinmay, Ayes |
|
|
17 |
3 |
p. 1403-1421 |
artikel |