nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive review on vehicular ad-hoc networks routing protocols for urban and highway scenarios, research gaps and future enhancements
|
Seth, Ishita |
|
|
17 |
4 |
p. 2090-2122 |
artikel |
2 |
A lightweight and anonymous mutual authentication and key agreement scheme for WBAN
|
Marandi, Saba |
|
|
17 |
4 |
p. 2555-2571 |
artikel |
3 |
An effective trajectory planning heuristics for UAV-assisted vessel monitoring system
|
Zhu, Jie |
|
|
17 |
4 |
p. 2491-2506 |
artikel |
4 |
An energy efficient Swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoT
|
Shanmugapriya, R. |
|
|
17 |
4 |
p. 1830-1864 |
artikel |
5 |
An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques
|
Minu, M. S. |
|
|
17 |
4 |
p. 2065-2089 |
artikel |
6 |
An intelligent behavioral-based DDOS attack detection method using adaptive time intervals
|
Shamekhi, Ali |
|
|
17 |
4 |
p. 2185-2204 |
artikel |
7 |
An optimal secure and reliable certificateless proxy signature for industrial internet of things
|
Ullah, Rafiq |
|
|
17 |
4 |
p. 2205-2220 |
artikel |
8 |
A peer-to-peer energy trading model for community microgrids with energy management
|
Ravivarma, K. |
|
|
17 |
4 |
p. 2538-2554 |
artikel |
9 |
A privacy protection scheme for green communication combining digital steganography
|
Zhao, Pengbiao |
|
|
17 |
4 |
p. 2507-2522 |
artikel |
10 |
Assessing the efficacy of a novel adaptive fuzzy c-means (AFCM) based clustering algorithm for mobile agent itinerary planning in wireless sensor networks using validity indices
|
Kashyap, Nidhi |
|
|
17 |
4 |
p. 2371-2383 |
artikel |
11 |
A supervised privacy preservation transaction system for aviation business
|
Zhou, Xingguang |
|
|
17 |
4 |
p. 1898-1913 |
artikel |
12 |
Authenticated key agreement for IoT network using HECC and CRT four co-primes
|
Goswami, Chandan |
|
|
17 |
4 |
p. 2397-2414 |
artikel |
13 |
BACASE-SH: Blockchain-based authenticated certificate-less asymmetric searchable encryption for smart healthcare
|
Arabnouri, Arian |
|
|
17 |
4 |
p. 2298-2314 |
artikel |
14 |
Bsfra: Blockchain based smart forward-reverse agrichain
|
Rishikesh, |
|
|
17 |
4 |
p. 1976-2000 |
artikel |
15 |
Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs)
|
Radhakrishnan, Pradeep |
|
|
17 |
4 |
p. 2572-2594 |
artikel |
16 |
DDPG-based optimal task placement strategy for computation offloading in green mobile edge networks
|
Lu, Kun |
|
|
17 |
4 |
p. 2435-2449 |
artikel |
17 |
Deep reinforcement learning-based joint optimization model for vehicular task offloading and resource allocation
|
Li, Zhi-Yuan |
|
|
17 |
4 |
p. 2001-2015 |
artikel |
18 |
DIEET: Knowledge–Infused Event Tracking in Social Media based on Deep Learning
|
Ge, Jun |
|
|
17 |
4 |
p. 2047-2064 |
artikel |
19 |
Dynamic behavioral profiling for anomaly detection in software-defined IoT networks: A machine learning approach
|
P, Senthilraja |
|
|
17 |
4 |
p. 2450-2469 |
artikel |
20 |
Energy efficient multi-objective cluster-based routing protocol for WSN using Interval Type-2 Fuzzy Logic modified dingo optimization
|
Verma, S. Kishore |
|
|
17 |
4 |
p. 1934-1962 |
artikel |
21 |
Enhancing cybersecurity in IoT networks: SLSTM-WCO algorithm for anomaly detection
|
Sharma, Tripti |
|
|
17 |
4 |
p. 2237-2258 |
artikel |
22 |
Enhancing IoT security in MANETs: A novel adaptive defense reinforcement approach
|
Saravanan, S. |
|
|
17 |
4 |
p. 2282-2297 |
artikel |
23 |
H-Louvain: Hierarchical Louvain-based community detection in social media data streams
|
Han, Zi-xuan |
|
|
17 |
4 |
p. 2334-2353 |
artikel |
24 |
HostSec: A blockchain-based authentication framework for SDN hosts
|
Latah, Majd |
|
|
17 |
4 |
p. 2354-2370 |
artikel |
25 |
Hybrid Multipath Routing Cluster head prediction based on SDN-enabled IoT and Heterogeneous context-aware graph convolution network
|
Prabha, R. |
|
|
17 |
4 |
p. 2016-2030 |
artikel |
26 |
IDA: Improved dragonfly algorithm for load balanced cluster heads selection in wireless sensor networks
|
Srivastava, Ankita |
|
|
17 |
4 |
p. 2315-2333 |
artikel |
27 |
Improved blockchain-based user authentication protocol with ring signature for internet of medical things
|
Priya, J. Chandra |
|
|
17 |
4 |
p. 2415-2434 |
artikel |
28 |
Improving byzantine fault tolerance based on stake evaluation and consistent hashing
|
Wu, Guangfu |
|
|
17 |
4 |
p. 1963-1975 |
artikel |
29 |
Improving NB-IoT performance in weak coverage areas with CBSTO polar coding and LMMSE channel estimation
|
Bavani, G |
|
|
17 |
4 |
p. 2384-2396 |
artikel |
30 |
Insulator defect detection in complex scenarios based on cascaded networks with lightweight attention mechanism
|
Ning, Yang |
|
|
17 |
4 |
p. 2123-2136 |
artikel |
31 |
Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN
|
A, Binthiya |
|
|
17 |
4 |
p. 1813-1829 |
artikel |
32 |
Invisible man: blockchain-enabled peer-to-peer collaborative privacy games in LBSs
|
Zhang, Beining |
|
|
17 |
4 |
p. 2595-2607 |
artikel |
33 |
Lower rounds lattice-based anonymous AKA under the seCK model for the IoT
|
Wei, Guanglu |
|
|
17 |
4 |
p. 2031-2046 |
artikel |
34 |
Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks
|
Kou, Xiaoyu |
|
|
17 |
4 |
p. 2523-2537 |
artikel |
35 |
ONMCA: One-Network-Multi-Chain Architecture for customizable asset-oriented blockchain systems
|
Wang, Liang |
|
|
17 |
4 |
p. 1914-1933 |
artikel |
36 |
Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing
|
Sangeethapriya, J. |
|
|
17 |
4 |
p. 1885-1897 |
artikel |
37 |
Service based VEINS framework for vehicular Ad-hoc network (VANET): A systematic review of state-of-the-art
|
Mohammed, Badiea Abdulkarem |
|
|
17 |
4 |
p. 2259-2281 |
artikel |
38 |
Smart grid security based on blockchain and smart contract
|
Zhang, Ming |
|
|
17 |
4 |
p. 2167-2184 |
artikel |
39 |
Social relation based DAG blockchain inspired healthcare of livestock
|
Bala, Kirti |
|
|
17 |
4 |
p. 1-21 |
artikel |
40 |
Supporting efficient video file streaming in P2P cloud storage
|
Kim, Jinsung |
|
|
17 |
4 |
p. 1865-1884 |
artikel |
41 |
Taas: Trust assessment as a service for secure communication of green edge-assisted UAV network
|
Wang, Qixu |
|
|
17 |
4 |
p. 2221-2236 |
artikel |
42 |
Truthful double auction based incentive mechanism for participatory sensing systems
|
Middya, Asif Iqbal |
|
|
17 |
4 |
p. 2137-2166 |
artikel |