nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
AAQ-PEKS: An Attribute-based Anti-Quantum Public Key Encryption Scheme with Keyword Search for E-healthcare Scenarios
|
Xu, Gang |
|
|
18 |
2 |
|
artikel |
2 |
A binary multi-objective approach for solving the WMNs topology planning problem
|
Taleb, Sylia Mekhmoukh |
|
|
18 |
2 |
|
artikel |
3 |
AccessChain: A scalable and privacy-preserving access control scheme for blockchain-based IoT
|
Piao, Guirong |
|
|
18 |
2 |
|
artikel |
4 |
A comprehensive and efficient CP-ABE scheme with full policy hiding and pre-decryption verification in peer-to-peer cyber-physical systems
|
Zhao, Xingwen |
|
|
18 |
2 |
|
artikel |
5 |
A decentralized scheme for multi-user edge computing task offloading based on dynamic pricing
|
Zheng, Liquan |
|
|
18 |
2 |
|
artikel |
6 |
A highly secure and stable energy aware multi-objective constraints-based hybrid optimization algorithms for effective optimal cluster head selection and routing in wireless sensor networks
|
Godi, Rakesh Kumar |
|
|
18 |
2 |
|
artikel |
7 |
A hybrid optimization and machine learning based energy-efficient clustering algorithm with self-diagnosis data fault detection and prediction for WSN-IoT application
|
Nathiya, N. |
|
|
18 |
2 |
|
artikel |
8 |
AIoT-enabled service prioritization for mobile nodes using enhanced PMIPv6 extension protocol
|
Khan, Habib Ullah |
|
|
18 |
2 |
|
artikel |
9 |
A lightweight IoT device identification using enhanced behavioral-based features
|
Rabbani, Mahdi |
|
|
18 |
2 |
|
artikel |
10 |
A multi-factor user authentication protocol for the internet of drones environment
|
de Jesus Sousa, Manuela |
|
|
18 |
2 |
|
artikel |
11 |
An efficient and private economic evaluation scheme in data markets
|
Han, Bing |
|
|
18 |
2 |
|
artikel |
12 |
An efficient and secured voting system using blockchain and hybrid validation technique with deep learning
|
Elhoseny, M. |
|
|
18 |
2 |
|
artikel |
13 |
An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT
|
Wu, Tsu-Yang |
|
|
18 |
2 |
|
artikel |
14 |
An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system
|
U, Nandhini |
|
|
18 |
2 |
|
artikel |
15 |
A privacy preserving batch audit scheme for IoT based cloud data storage
|
Ganesh, S. Milton |
|
|
18 |
2 |
|
artikel |
16 |
A secure digital evidence preservation system for an iot-enabled smart environment using ipfs, blockchain, and smart contracts
|
Rani, Deepti |
|
|
18 |
2 |
|
artikel |
17 |
A steganographic backdoor attack scheme on encrypted traffic
|
Rao, Bing |
|
|
18 |
2 |
|
artikel |
18 |
BBAD: Blockchain-based data assured deletion and access control system for IoT
|
Meng, Yuxuan |
|
|
18 |
2 |
|
artikel |
19 |
Blockchain-based synchronized data transmission with dynamic device management for digital twin in IIoT
|
Chang, Le |
|
|
18 |
2 |
|
artikel |
20 |
Boosted sooty tern and piranhav foraging meta-heuristic optimized cluster head selection-based routing algorithm for extending network lifetime in WSNs
|
Amshavalli, R. S. |
|
|
18 |
2 |
|
artikel |
21 |
Classification of intrusion using Multi-Stream Generative Adversarial Networks in Wireless Sensor Networks
|
Prabakar, D. |
|
|
18 |
2 |
|
artikel |
22 |
CoHide: Overlapping community hiding algorithm based on multi-criteria learning optimization
|
Han, Zi-xuan |
|
|
18 |
2 |
|
artikel |
23 |
Deduplication-enabled CP-ABE with revocation
|
Zhou, Tiantian |
|
|
18 |
2 |
|
artikel |
24 |
Deep learning for intrusion detection in IoT networks
|
Selem, Mehdi |
|
|
18 |
2 |
|
artikel |
25 |
Distributed denial of service attack detection and mitigation strategy in 5G-enabled internet of things networks with adaptive cascaded gated recurrent unit
|
Akhtar, Md. Mobin |
|
|
18 |
2 |
|
artikel |
26 |
Efficient multi-job federated learning scheduling with fault tolerance
|
Fu, Boqian |
|
|
18 |
2 |
|
artikel |
27 |
End-to-end supervised learning for NOMA-enabled resource allocation: A dynamic and scalable approach
|
Yang, Leyou |
|
|
18 |
2 |
|
artikel |
28 |
Energy-aware and efficient cluster head selection and routing in wireless sensor networks using improved artificial bee Colony algorithm
|
Alsuwat, Hatim |
|
|
18 |
2 |
|
artikel |
29 |
Enhancing security in electronic health records using an adaptive feature-centric polynomial data security model with blockchain integration
|
Dhinakaran, D. |
|
|
18 |
2 |
|
artikel |
30 |
Hybrid Termite Queen and Walrus Optimization Algorithm-based energy efficient cluster-based routing with static and mobile sink node in WSNs
|
Rajarajeswari, PL |
|
|
18 |
2 |
|
artikel |
31 |
Intrusion defense: Leveraging ant colony optimization for enhanced multi-optimization in network security
|
Gupta, Chetan |
|
|
18 |
2 |
|
artikel |
32 |
IoT-enabled wireless sensor networks optimization based on federated reinforcement learning for enhanced performance
|
Sattibabu, Gummarekula |
|
|
18 |
2 |
|
artikel |
33 |
IPML-ANP: An integrated polynomial manifold learning model and anchor node placement for wireless sensor node localization
|
K., John Peter |
|
|
18 |
2 |
|
artikel |
34 |
Joint scheduling and routing for end-to-end deterministic transmission in TSN
|
Jia, Jie |
|
|
18 |
2 |
|
artikel |
35 |
LVCA: An efficient voting-based consensus algorithm in private Blockchain for enhancing data security
|
Verma, Sudhani |
|
|
18 |
2 |
|
artikel |
36 |
Mitigating bias in heterogeneous federated learning via stratified client selection
|
Liu, Yazhi |
|
|
18 |
2 |
|
artikel |
37 |
MobiPower: Scheduling mobile charging stations for UAV-mounted edge servers in Internet of Vehicles
|
Huang, Aiwen |
|
|
18 |
2 |
|
artikel |
38 |
NHBBWO: A novel hybrid butterfly-beluga whale optimization algorithm with the dynamic strategy for WSN coverage optimization
|
Chen, Xinyi |
|
|
18 |
2 |
|
artikel |
39 |
Novel joint data collection and wireless charging algorithm for rechargeable wireless sensor networks
|
Chandra, Pankaj |
|
|
18 |
2 |
|
artikel |
40 |
Optimized auxiliary physics neural network based multi-target detection for edge-cloud in smart internet of things
|
Prabha, B. |
|
|
18 |
2 |
|
artikel |
41 |
Provisioning, authentication, and integrity-preserving communication scheme for Internet of things-enabled devices
|
Alserhani, Faeiz Mohammed |
|
|
18 |
2 |
|
artikel |
42 |
QoS-Aware cloud security using lightweight EfficientNet with Adaptive Sparse Bayesian Optimization
|
J, Vinothini |
|
|
18 |
2 |
|
artikel |
43 |
Research on distributed UWSN power control algorithm based on cooperative game
|
Xue, Libin |
|
|
18 |
2 |
|
artikel |
44 |
Service caching with multi-agent reinforcement learning in cloud-edge collaboration computing
|
Li, Yinglong |
|
|
18 |
2 |
|
artikel |
45 |
SJO-MRL: Energy efficient path selection algorithm for WSNs
|
K, Mohana Bhindu |
|
|
18 |
2 |
|
artikel |
46 |
Startup delay aware short video ordering: Problem, model, and a reinforcement learning based algorithm
|
Gao, Zhipeng |
|
|
18 |
2 |
|
artikel |
47 |
Strengthening security in IoT-based smart cities utilizing cycle-consistent generative adversarial networks for attack detection and secure data transmission
|
W, Agitha |
|
|
18 |
2 |
|
artikel |
48 |
Trust-based secure federated learning framework to mitigate internal attacks for intelligent vehicular networks
|
Naik, D. S. Bhupal |
|
|
18 |
2 |
|
artikel |
49 |
Unified modeling and evaluation of availability and power consumption in the internet of things
|
Soleimani Borujerdi, Amir |
|
|
18 |
2 |
|
artikel |