nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A data encryption and file sharing framework among microservices-based edge nodes with blockchain
|
Li, Weimin |
|
|
18 |
1 |
|
artikel |
2 |
A joint task caching and computation offloading scheme based on deep reinforcement learning
|
Tian, Huizi |
|
|
18 |
1 |
|
artikel |
3 |
A multi-cycle recursive clustering algorithm for the analysis of social media data streams
|
Ayorinde, Ayodeji O. |
|
|
18 |
1 |
|
artikel |
4 |
An efficient propagation algorithm based on node clustering and seed node selection in a blockchain network
|
Hai, Mo |
|
|
18 |
1 |
|
artikel |
5 |
An enhanced deep learning integrated blockchain framework for securing industrial IoT
|
Suneetha, G. |
|
|
18 |
1 |
|
artikel |
6 |
An intelligent fault node diagnosis and classification approach using XGBoost with whale optimization in wireless sensor networks
|
Nagarajan, B |
|
|
18 |
1 |
|
artikel |
7 |
An intelligent sailfish optimization based fault diagnosis and classification in wireless sensor networks
|
B, Nagarajan |
|
|
18 |
1 |
|
artikel |
8 |
A novel secure supply chain for smart healthcare systems: An approach to leverage blockchain, Keccak-256, and ZKP for drug safety assurance
|
Samantray, Bhabani Sankar |
|
|
18 |
1 |
|
artikel |
9 |
A privacy-preserving method for cross-chain interoperability using homomorphic encryption
|
Cao, Dongyu |
|
|
18 |
1 |
|
artikel |
10 |
A scalable identity management scheme via blockchain: Identity protection and traceability
|
Ma, Biao |
|
|
18 |
1 |
|
artikel |
11 |
A secure and lightweight data sharing scheme in vehicular digital twin network
|
Li, Guanjie |
|
|
18 |
1 |
|
artikel |
12 |
A study on the application of the T5 large language model in encrypted traffic classification
|
Luo, Jian |
|
|
18 |
1 |
|
artikel |
13 |
A sustainable mutual authentication protocol for IoT-Fog-Cloud environment
|
Satpathy, Swati Priyambada |
|
|
18 |
1 |
|
artikel |
14 |
Blockchain-driven security for IoT networks: State-of-the-art, challenges and future directions
|
Maurya, Vinay |
|
|
18 |
1 |
|
artikel |
15 |
Blockchain-oriented secure communication and smart parking model for internet of electric vehicles in smart cities
|
Sahu, Brijmohan Lal |
|
|
18 |
1 |
|
artikel |
16 |
BT-CNV: A distributed and decentralized solution for certificate notarization and verification for academia using public blockchain
|
Rani, Prity |
|
|
18 |
1 |
|
artikel |
17 |
Chebyshev chaotic map with attribute based encryption on session based data-sharing in fog environment
|
G.A, Thushara |
|
|
18 |
1 |
|
artikel |
18 |
CLGR: Connectivity and link quality aware geographical routing using AHP-TOPSIS for FANETs
|
Singh, Vikramjit |
|
|
18 |
1 |
|
artikel |
19 |
Coot-feedback artificial tree-based energy-aware electric vehicle charge scheduling algorithm
|
K, Mekala |
|
|
18 |
1 |
|
artikel |
20 |
Design of secure and unique addressing with mutual authentication scheme in IoT networks
|
Sharma, Neha |
|
|
18 |
1 |
|
artikel |
21 |
Differential privacy preserving based framework using blockchain for internet-of-things
|
Kashif, Muhammad |
|
|
18 |
1 |
|
artikel |
22 |
Dynamical repair strategy of data network controllability processes against DoS attack on complex temporal networks
|
Xie, Zhixin |
|
|
18 |
1 |
|
artikel |
23 |
EEPS: Optimizing energy-efficient path selection in the Internet of Battlefield Things (IoBT) utilizing SDN
|
Almuntasheri, Sumayah A. |
|
|
18 |
1 |
|
artikel |
24 |
Efficient anti-quantum attack batch authentication and key agreement protocol based on NTRU in VANET
|
Wen, Jingliang |
|
|
18 |
1 |
|
artikel |
25 |
Efficient privacy-preserving federated logistic regression with poor-quality users
|
Zheng, Tao |
|
|
18 |
1 |
|
artikel |
26 |
Enhanced DGA detection in Botnet traffic: leveraging N-Gram, topic modeling, and attention BiLSTM
|
Harishkumar, S. |
|
|
18 |
1 |
|
artikel |
27 |
Enhancing intrusion detection in MANETs with blockchain-based trust management and enhanced GRU model
|
Krishna, ES Phalguna |
|
|
18 |
1 |
|
artikel |
28 |
Fine-grained data deletion supporting dynamic data insertion for cloud storage
|
Yang, Changsong |
|
|
18 |
1 |
|
artikel |
29 |
GTD3-NET: A deep reinforcement learning-based routing optimization algorithm for wireless networks
|
Lu, You |
|
|
18 |
1 |
|
artikel |
30 |
Hague: a hybrid scaling stateless blockchain
|
Li, Yi |
|
|
18 |
1 |
|
artikel |
31 |
Heterogeneity-aware device selection for clustered federated learning in IoT
|
Zhang, Hongxia |
|
|
18 |
1 |
|
artikel |
32 |
HML-BFT: Hybrid multi-layer BFT consensus with reputation model for large-scale blockchain
|
Chen, Wei |
|
|
18 |
1 |
|
artikel |
33 |
IoT-based smart healthcare using efficient data gathering and data analysis
|
Adam Sahib, Raja Basha |
|
|
18 |
1 |
|
artikel |
34 |
IoV-SFL: A blockchain-based federated learning framework for secure and efficient data sharing in the internet of vehicles
|
Ullah, Irshad |
|
|
18 |
1 |
|
artikel |
35 |
Multimodal data privacy protection and completeness verification method for mobile crowd sensing
|
Wang, Jian |
|
|
18 |
1 |
|
artikel |
36 |
NEIL: aN EfficIent cLuster-based device discovery for D2D communication in B5G
|
Kumari, Richa |
|
|
18 |
1 |
|
artikel |
37 |
Optimized stochastic particle swarm optimization integrated ranked backoff medium access control for optimal route selection in wireless sensor networks
|
Mann, Mamta |
|
|
18 |
1 |
|
artikel |
38 |
OREVI_PCH: An optimized resource-efficient redaction mechanism with integrity validation in policy-based chameleon hash for IoT applications
|
Abd Ali, Shams Mhmood |
|
|
18 |
1 |
|
artikel |
39 |
Parallel Byzantine fault tolerance consensus based on trusted execution environments
|
Wang, Ran |
|
|
18 |
1 |
|
artikel |
40 |
PB-Raft: A Byzantine fault tolerance consensus algorithm based on weighted PageRank and BLS threshold signature
|
Shi, Haoran |
|
|
18 |
1 |
|
artikel |
41 |
Performance analysis of D2D cooperative networks based on probabilistic relay forwarding mechanism
|
Zhao, Yuan |
|
|
18 |
1 |
|
artikel |
42 |
Reinforcement Q-learning enabled energy-efficient service function chain provisioning in multi-domain networks
|
Wang, Zhiying |
|
|
18 |
1 |
|
artikel |
43 |
SecShield: An IoT access control framework with edge caching using software defined network
|
Zangaraki, Shahrbanoo |
|
|
18 |
1 |
|
artikel |
44 |
Security resource allocation in blockchain-based IoT
|
Zhang, Hang |
|
|
18 |
1 |
|
artikel |
45 |
Smart contract empowered dynamic consent: decentralized storage and access control for healthcare applications
|
Singh, Aparna |
|
|
18 |
1 |
|
artikel |
46 |
The real estate tokenized investment system based on ethereum blockchain
|
Zhang, Liyuan |
|
|
18 |
1 |
|
artikel |
47 |
Trust-based resource allocation and task splitting in ultra-dense mobile edge computing network
|
Patel, Rachit |
|
|
18 |
1 |
|
artikel |
48 |
Unveiling bitcoin network attack using deep reinforcement learning with Boltzmann exploration
|
Shetty, Monali |
|
|
18 |
1 |
|
artikel |
49 |
WikiChain: An improved resilient, pseudo-transparent knowledge base
|
J., Chandra Priya |
|
|
18 |
1 |
|
artikel |