Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             42 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive review on vehicular ad-hoc networks routing protocols for urban and highway scenarios, research gaps and future enhancements Seth, Ishita

17 4 p. 2090-2122
artikel
2 A lightweight and anonymous mutual authentication and key agreement scheme for WBAN Marandi, Saba

17 4 p. 2555-2571
artikel
3 An effective trajectory planning heuristics for UAV-assisted vessel monitoring system Zhu, Jie

17 4 p. 2491-2506
artikel
4 An energy efficient Swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoT Shanmugapriya, R.

17 4 p. 1830-1864
artikel
5 An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques Minu, M. S.

17 4 p. 2065-2089
artikel
6 An intelligent behavioral-based DDOS attack detection method using adaptive time intervals Shamekhi, Ali

17 4 p. 2185-2204
artikel
7 An optimal secure and reliable certificateless proxy signature for industrial internet of things Ullah, Rafiq

17 4 p. 2205-2220
artikel
8 A peer-to-peer energy trading model for community microgrids with energy management Ravivarma, K.

17 4 p. 2538-2554
artikel
9 A privacy protection scheme for green communication combining digital steganography Zhao, Pengbiao

17 4 p. 2507-2522
artikel
10 Assessing the efficacy of a novel adaptive fuzzy c-means (AFCM) based clustering algorithm for mobile agent itinerary planning in wireless sensor networks using validity indices Kashyap, Nidhi

17 4 p. 2371-2383
artikel
11 A supervised privacy preservation transaction system for aviation business Zhou, Xingguang

17 4 p. 1898-1913
artikel
12 Authenticated key agreement for IoT network using HECC and CRT four co-primes Goswami, Chandan

17 4 p. 2397-2414
artikel
13 BACASE-SH: Blockchain-based authenticated certificate-less asymmetric searchable encryption for smart healthcare Arabnouri, Arian

17 4 p. 2298-2314
artikel
14 Bsfra: Blockchain based smart forward-reverse agrichain Rishikesh,

17 4 p. 1976-2000
artikel
15 Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs) Radhakrishnan, Pradeep

17 4 p. 2572-2594
artikel
16 DDPG-based optimal task placement strategy for computation offloading in green mobile edge networks Lu, Kun

17 4 p. 2435-2449
artikel
17 Deep reinforcement learning-based joint optimization model for vehicular task offloading and resource allocation Li, Zhi-Yuan

17 4 p. 2001-2015
artikel
18 DIEET: Knowledge–Infused Event Tracking in Social Media based on Deep Learning Ge, Jun

17 4 p. 2047-2064
artikel
19 Dynamic behavioral profiling for anomaly detection in software-defined IoT networks: A machine learning approach P, Senthilraja

17 4 p. 2450-2469
artikel
20 Energy efficient multi-objective cluster-based routing protocol for WSN using Interval Type-2 Fuzzy Logic modified dingo optimization Verma, S. Kishore

17 4 p. 1934-1962
artikel
21 Enhancing cybersecurity in IoT networks: SLSTM-WCO algorithm for anomaly detection Sharma, Tripti

17 4 p. 2237-2258
artikel
22 Enhancing IoT security in MANETs: A novel adaptive defense reinforcement approach Saravanan, S.

17 4 p. 2282-2297
artikel
23 H-Louvain: Hierarchical Louvain-based community detection in social media data streams Han, Zi-xuan

17 4 p. 2334-2353
artikel
24 HostSec: A blockchain-based authentication framework for SDN hosts Latah, Majd

17 4 p. 2354-2370
artikel
25 Hybrid Multipath Routing Cluster head prediction based on SDN-enabled IoT and Heterogeneous context-aware graph convolution network Prabha, R.

17 4 p. 2016-2030
artikel
26 IDA: Improved dragonfly algorithm for load balanced cluster heads selection in wireless sensor networks Srivastava, Ankita

17 4 p. 2315-2333
artikel
27 Improved blockchain-based user authentication protocol with ring signature for internet of medical things Priya, J. Chandra

17 4 p. 2415-2434
artikel
28 Improving byzantine fault tolerance based on stake evaluation and consistent hashing Wu, Guangfu

17 4 p. 1963-1975
artikel
29 Improving NB-IoT performance in weak coverage areas with CBSTO polar coding and LMMSE channel estimation Bavani, G

17 4 p. 2384-2396
artikel
30 Insulator defect detection in complex scenarios based on cascaded networks with lightweight attention mechanism Ning, Yang

17 4 p. 2123-2136
artikel
31 Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN A, Binthiya

17 4 p. 1813-1829
artikel
32 Invisible man: blockchain-enabled peer-to-peer collaborative privacy games in LBSs Zhang, Beining

17 4 p. 2595-2607
artikel
33 Lower rounds lattice-based anonymous AKA under the seCK model for the IoT Wei, Guanglu

17 4 p. 2031-2046
artikel
34 Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks Kou, Xiaoyu

17 4 p. 2523-2537
artikel
35 ONMCA: One-Network-Multi-Chain Architecture for customizable asset-oriented blockchain systems Wang, Liang

17 4 p. 1914-1933
artikel
36 Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing Sangeethapriya, J.

17 4 p. 1885-1897
artikel
37 Service based VEINS framework for vehicular Ad-hoc network (VANET): A systematic review of state-of-the-art Mohammed, Badiea Abdulkarem

17 4 p. 2259-2281
artikel
38 Smart grid security based on blockchain and smart contract Zhang, Ming

17 4 p. 2167-2184
artikel
39 Social relation based DAG blockchain inspired healthcare of livestock Bala, Kirti

17 4 p. 1-21
artikel
40 Supporting efficient video file streaming in P2P cloud storage Kim, Jinsung

17 4 p. 1865-1884
artikel
41 Taas: Trust assessment as a service for secure communication of green edge-assisted UAV network Wang, Qixu

17 4 p. 2221-2236
artikel
42 Truthful double auction based incentive mechanism for participatory sensing systems Middya, Asif Iqbal

17 4 p. 2137-2166
artikel
                             42 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland