Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             49 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 AAQ-PEKS: An Attribute-based Anti-Quantum Public Key Encryption Scheme with Keyword Search for E-healthcare Scenarios Xu, Gang

18 2 artikel
2 A binary multi-objective approach for solving the WMNs topology planning problem Taleb, Sylia Mekhmoukh

18 2 artikel
3 AccessChain: A scalable and privacy-preserving access control scheme for blockchain-based IoT Piao, Guirong

18 2 artikel
4 A comprehensive and efficient CP-ABE scheme with full policy hiding and pre-decryption verification in peer-to-peer cyber-physical systems Zhao, Xingwen

18 2 artikel
5 A decentralized scheme for multi-user edge computing task offloading based on dynamic pricing Zheng, Liquan

18 2 artikel
6 A highly secure and stable energy aware multi-objective constraints-based hybrid optimization algorithms for effective optimal cluster head selection and routing in wireless sensor networks Godi, Rakesh Kumar

18 2 artikel
7 A hybrid optimization and machine learning based energy-efficient clustering algorithm with self-diagnosis data fault detection and prediction for WSN-IoT application Nathiya, N.

18 2 artikel
8 AIoT-enabled service prioritization for mobile nodes using enhanced PMIPv6 extension protocol Khan, Habib Ullah

18 2 artikel
9 A lightweight IoT device identification using enhanced behavioral-based features Rabbani, Mahdi

18 2 artikel
10 A multi-factor user authentication protocol for the internet of drones environment de Jesus Sousa, Manuela

18 2 artikel
11 An efficient and private economic evaluation scheme in data markets Han, Bing

18 2 artikel
12 An efficient and secured voting system using blockchain and hybrid validation technique with deep learning Elhoseny, M.

18 2 artikel
13 An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT Wu, Tsu-Yang

18 2 artikel
14 An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system U, Nandhini

18 2 artikel
15 A privacy preserving batch audit scheme for IoT based cloud data storage Ganesh, S. Milton

18 2 artikel
16 A secure digital evidence preservation system for an iot-enabled smart environment using ipfs, blockchain, and smart contracts Rani, Deepti

18 2 artikel
17 A steganographic backdoor attack scheme on encrypted traffic Rao, Bing

18 2 artikel
18 BBAD: Blockchain-based data assured deletion and access control system for IoT Meng, Yuxuan

18 2 artikel
19 Blockchain-based synchronized data transmission with dynamic device management for digital twin in IIoT Chang, Le

18 2 artikel
20 Boosted sooty tern and piranhav foraging meta-heuristic optimized cluster head selection-based routing algorithm for extending network lifetime in WSNs Amshavalli, R. S.

18 2 artikel
21 Classification of intrusion using Multi-Stream Generative Adversarial Networks in Wireless Sensor Networks Prabakar, D.

18 2 artikel
22 CoHide: Overlapping community hiding algorithm based on multi-criteria learning optimization Han, Zi-xuan

18 2 artikel
23 Deduplication-enabled CP-ABE with revocation Zhou, Tiantian

18 2 artikel
24 Deep learning for intrusion detection in IoT networks Selem, Mehdi

18 2 artikel
25 Distributed denial of service attack detection and mitigation strategy in 5G-enabled internet of things networks with adaptive cascaded gated recurrent unit Akhtar, Md. Mobin

18 2 artikel
26 Efficient multi-job federated learning scheduling with fault tolerance Fu, Boqian

18 2 artikel
27 End-to-end supervised learning for NOMA-enabled resource allocation: A dynamic and scalable approach Yang, Leyou

18 2 artikel
28 Energy-aware and efficient cluster head selection and routing in wireless sensor networks using improved artificial bee Colony algorithm Alsuwat, Hatim

18 2 artikel
29 Enhancing security in electronic health records using an adaptive feature-centric polynomial data security model with blockchain integration Dhinakaran, D.

18 2 artikel
30 Hybrid Termite Queen and Walrus Optimization Algorithm-based energy efficient cluster-based routing with static and mobile sink node in WSNs Rajarajeswari, PL

18 2 artikel
31 Intrusion defense: Leveraging ant colony optimization for enhanced multi-optimization in network security Gupta, Chetan

18 2 artikel
32 IoT-enabled wireless sensor networks optimization based on federated reinforcement learning for enhanced performance Sattibabu, Gummarekula

18 2 artikel
33 IPML-ANP: An integrated polynomial manifold learning model and anchor node placement for wireless sensor node localization K., John Peter

18 2 artikel
34 Joint scheduling and routing for end-to-end deterministic transmission in TSN Jia, Jie

18 2 artikel
35 LVCA: An efficient voting-based consensus algorithm in private Blockchain for enhancing data security Verma, Sudhani

18 2 artikel
36 Mitigating bias in heterogeneous federated learning via stratified client selection Liu, Yazhi

18 2 artikel
37 MobiPower: Scheduling mobile charging stations for UAV-mounted edge servers in Internet of Vehicles Huang, Aiwen

18 2 artikel
38 NHBBWO: A novel hybrid butterfly-beluga whale optimization algorithm with the dynamic strategy for WSN coverage optimization Chen, Xinyi

18 2 artikel
39 Novel joint data collection and wireless charging algorithm for rechargeable wireless sensor networks Chandra, Pankaj

18 2 artikel
40 Optimized auxiliary physics neural network based multi-target detection for edge-cloud in smart internet of things Prabha, B.

18 2 artikel
41 Provisioning, authentication, and integrity-preserving communication scheme for Internet of things-enabled devices Alserhani, Faeiz Mohammed

18 2 artikel
42 QoS-Aware cloud security using lightweight EfficientNet with Adaptive Sparse Bayesian Optimization J, Vinothini

18 2 artikel
43 Research on distributed UWSN power control algorithm based on cooperative game Xue, Libin

18 2 artikel
44 Service caching with multi-agent reinforcement learning in cloud-edge collaboration computing Li, Yinglong

18 2 artikel
45 SJO-MRL: Energy efficient path selection algorithm for WSNs K, Mohana Bhindu

18 2 artikel
46 Startup delay aware short video ordering: Problem, model, and a reinforcement learning based algorithm Gao, Zhipeng

18 2 artikel
47 Strengthening security in IoT-based smart cities utilizing cycle-consistent generative adversarial networks for attack detection and secure data transmission W, Agitha

18 2 artikel
48 Trust-based secure federated learning framework to mitigate internal attacks for intelligent vehicular networks Naik, D. S. Bhupal

18 2 artikel
49 Unified modeling and evaluation of availability and power consumption in the internet of things Soleimani Borujerdi, Amir

18 2 artikel
                             49 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland