Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             83 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain-based data transaction method with privacy protection and fairness Yuan, Ye

18 4 artikel
2 Adaptive meta-learning for denial-of-service defense Salim, Salmi

18 4 artikel
3 A hybrid reinforcement learning approach for multipath routing optimization in software-defined networks Hassen, Houda

18 4 artikel
4 A hybrid shuffled frog-leaping scheduling algorithm for power management of directional sensor networks Mokaripoor, Peyman

18 4 artikel
5 AI-driven proactive security defense in distributed iov systems: Cyber threat intelligence modeling for connected autonomous vehicles Wang, Yinghui

18 4 artikel
6 A lightweight biometric-assisted authentication approach for internet of things Rahmani, Kamal

18 4 artikel
7 A model for SLA aware admission control and QoS aware task scheduling in cloud environment Jain, Richa

18 4 artikel
8 A multi-notary cross-chain system with supervision and identity tracking Liang, Hai

18 4 artikel
9 An effective meta-heuristics for trajectory planning problem in UAV-assisted vessel emission detection system Zhu, Jie

18 4 artikel
10 An efficient certificateless signcryption for mutual and batch authentication in Vehicular Ad-hoc Networks (VANETs) Chiang, Wei-Kuo

18 4 artikel
11 An enhanced attention and dilated convolution-based ensemble model for network intrusion detection system against adversarial evasion attacks Awad, Omer Fawzi

18 4 artikel
12 An in-depth analysis of computation offloading approaches in multi-access edge computing systems Lokavarapu, V Srinivas

18 4 artikel
13 A novel approach for ensuring drug safety in the pharmaceutical supply Chain by using IoT devices and blockchain technology Pranitha, Gadde

18 4 artikel
14 A privacy-preserving hybrid ensemble classifier using decision tree and naïve bayes approach for federated learning M, Vaishnavi

18 4 artikel
15 A robust and efficient blockchain-based framework for updating firmware in IoT environments Yohan, Alexander

18 4 artikel
16 A secure and resource-efficient authenticated key agreement framework for mobile edge computing Tanveer, Muhammad

18 4 artikel
17 A security enhanced certificateless aggregate signcryption scheme for VANETs Liu, Dong

18 4 artikel
18 A standard-driven framework for blockchain security risk assessment Boughdiri, Maher

18 4 artikel
19 A state machine-based mobility model for UAVs supporting VANETs Bouchrit, Leila

18 4 artikel
20 Attentional value-factorization-based resource allocation and performance evaluation for intelligent connected vehicles Cai, Chao

18 4 artikel
21 BCT-FLHD: A blockchain-enabled federated learning framework for healthcare 5.0 disease detection Tiwari, Kajal

18 4 artikel
22 Blockchain and federated learning based on aggregation techniques for industrial IoT: A contemporary survey Shawkat, Mai

18 4 artikel
23 Blockchain and homomorphic encryption based system for secure supply chain network against counterfeit drugs Agarwal, Udit

18 4 artikel
24 Blockchain-based decentralized identifier in metaverse environment for secure and privacy-preserving authentication with improved key management and cryptosystem S, Vijitha

18 4 artikel
25 Blockchain based deep learning model for the security in industrial internet of things M, Tejeswara Kumar

18 4 artikel
26 Blockchain-enabled secured supply chain for smart cities: A systematic review on architecture, technology, and service management Samantray, Bhabani Sankar

18 4 artikel
27 Blockchain-powered trust management methodology in SIoT: A survey Jmal, Raouf

18 4 artikel
28 Blockchain technology for digital twin security in smart grids using interpretable generalized additive neural networks Suggala, Ravi Kumar

18 4 artikel
29 CAT: A simple heterogeneous ensemble learning framework for network intrusion detection Zhang, Zheng

18 4 artikel
30 Combating evolving threats: A robust malicious domain detection framework for distributed networks Jin, Yinuo

18 4 artikel
31 Content caching in relay-assisted D2D communications using robust combinatorial optimization Al-Balaghee, Ali

18 4 artikel
32 Correction to: Classification of intrusion using Multi-Stream Generative Adversarial Networks in Wireless Sensor Networks Prabakar, D.

18 4 artikel
33 Corrigendum to “SE-LAKAF: Security Enhanced Lightweight Authentication and Key Agreement Framework for Smart Grid Network” Cao, Zhengjun

18 4 artikel
34 Creating a realistic sybil attack dataset for inter-vehicle communication Guven, Taner

18 4 artikel
35 Cross-domain secure communication scheme in industrial internet of things based on consortium blockchain Han, Gang

18 4 artikel
36 Cryptanalysis and enhancement of a quantum-secure two-party authentication protocol for mobile devices Saeidi, Mohammad Reza

18 4 artikel
37 CuraFrame: a patient-centric secure and privacy preserving medical framework with zero-leak using blockchain Vishwakarma, Lokendra

18 4 artikel
38 Data security and access control method of blockchain with revocable attribute encryption in steel supply chain Gao, Jie

18 4 artikel
39 Deadline-aware workload scheduling for edge-enhanced iot devices: A blockchain-enabled approach to incentive-based computing Chaudhry, Muhammad Tayyab

18 4 artikel
40 Deep learning and blockchain-based secure authentication protocol for privacy protection in cloud environments Subbarayan, Kalaiselvi

18 4 artikel
41 Design and optimization of intelligent sports IoT system based on big data and quantum computing Zhang, Yang

18 4 artikel
42 DPSLS: an efficient local search algorithm for pure MaxSAT Zhou, Huisi

18 4 artikel
43 Dynamic sharding mechanism for vehicle networking to ensure load balancing and data reliability Du, Zhiqiang

18 4 artikel
44 EESDA: Energy-Efficient And Secure Data Aggregation Protocol for IoT N, Sheena

18 4 artikel
45 EMKPPA: Efficient multi-key privacy-preserving aggregation in federated learning Liu, Zhen

18 4 artikel
46 Encoder only attention-guided transformer framework for accurate and explainable social media fake profile detection Shukla, Prashant Kumar

18 4 artikel
47 Energy aware DBSCAN and mobility aware balanced q-learning based opportunistic routing protocol in MANET Das, A. Daniel Gurwin

18 4 artikel
48 Enhanced QoS-aware secure routing protocol for WAHNs using advanced fast double decker new binary archimedes kepler pure convolutional transformer network and cryptographic techniques Khagga, Vijayalakshmi

18 4 artikel
49 Ensemble bagging-based classifier for eavesdropper detection in 6G wireless networks Mohan, Swethambri

18 4 artikel
50 Exploring equivariant and invariant features for website fingerprinting in distributed networks Li, Jiajun

18 4 artikel
51 Federated active meta-learning with blockchain for zero-day attack detection in industrial IoT Kumar, Kapil

18 4 artikel
52 Heterogeneous signcryption scheme from CLC to IBC for IIoT Jin, Chunhua

18 4 artikel
53 Hybrid key management WSN protocol to enhance network performance using ML techniques for IoT application in cloud environment M, Raghini

18 4 artikel
54 Hybrid optimization and deep learning for enhancing accuracy in fraud detection using big data techniques Hu, Jingchao

18 4 artikel
55 Integrating request stochasticity for efficient resource placement in general edge architecture with no level limit Gao, Jimei

18 4 artikel
56 Intrusion detection system for Denial of Service (DoS) attacks in healthcare cybersecurity on System on Chip (SoC) – PYTHON productivity for ZYNQ (PYNQ Z1) Sridevi, A.

18 4 artikel
57 IoT data caching and scheduling in heterogeneous mobile networks by exploiting mobility and transient data characteristics Mousavi Jalali, Seyedeh Maryam

18 4 artikel
58 Joint optimization of roadside unit deployment and connected vehicle routing for emergency information propagation Ren, Yining

18 4 artikel
59 LEFAM: Lightweight scalable efficient failover authentication mechanism for fog-based IoT environment Abdussami, Mohammad

18 4 artikel
60 Lightweight batch tamper proof detection for anonymous outsourced data in cloud-assisted industrial internet of things Liu, Bingyun

18 4 artikel
61 Message digest and blockchain based chaotic ordered cyber secured cloud of things for smart health care Munnangi, Ashok Kumar

18 4 artikel
62 MHQoS: A multi-user hierarchical quality of service optimization for P2P storage Zhao, Jingzhe

18 4 artikel
63 Minecrafter: A secure and decentralized consensus protocol for blockchain-enabled vaccine supply chain Maloth, Sreenu

18 4 artikel
64 Mitigating DDoS attacks on the internet of things using federated learning Shirvani, Ghazaleh

18 4 artikel
65 Mitigation of selfish mining attack using dynamic difficulty adjustment algorithm Patil, Shriniwas

18 4 artikel
66 Multifactor SM9 blind signature large models data privacy preservation approach Zhang, Jiazheng

18 4 artikel
67 Multi-layered retrieval integrity verification mechanism for blockchain oracle Wu, Rui

18 4 artikel
68 Optimal hybrid energy-saving cluster head selection for wireless sensor networks: an empirical study Lonkar, Bhupesh

18 4 artikel
69 Optimized energy-efficient routing in agriculture using wireless sensor networks Lavanya, Y.

18 4 artikel
70 Pivacy-preserving federated learning based on multi-key fully homomorphic encryption and trusted execution environment Liu, Gang

18 4 artikel
71 Privacy preserving hierarchical federated learning approach for secure urban mobility prediction Naresh, Vankamamidi S.

18 4 artikel
72 Proof of time offset: Blockchain consensus for resource constrained environments Gugnani, Pankaj

18 4 artikel
73 PTSC: an efficient random boolean consensus algorithm for distributed systems with the probabilistic propagation model Cao, Yuke

18 4 artikel
74 Reinforcement learning-driven temporal knowledge graph reasoning for secure data provenance in distributed networks Qiu, Yunxiang

18 4 artikel
75 Secure and efficient fully dynamic group signature based on RSIS and RLWE Pareek, Vishal

18 4 artikel
76 Starkburger-game-based real-time pricing method for energy transactions in smart grid Sun, Jun

18 4 artikel
77 STP: a permissioned blockchain solution for dynamic pricing and traceability in food supply chain Rani, Pritam

18 4 artikel
78 The future of misinformation control: integrating advanced algorithms and Blockchain for effective Deepfake detection Xu, Shiyou

18 4 artikel
79 The security and vulnerability issues of blockchain technology: A SWOC analysis Punia, Aarti

18 4 artikel
80 Towards precision agriculture: utilizing IoT and deep learning for automatic farm fire detection and extinguishing Khatri, Aanchal

18 4 artikel
81 User satisfaction aware edge server utilization enhancement in mobile edge computing Chen, Liqiong

18 4 artikel
82 ValidCertify: an effective blockchain-based domain certificate authentication and verification scheme Kadam, Priyanka Amol

18 4 artikel
83 WIVIM: Web Injection Vulnerabilities Detection Based on Interprocedural Analysis and MiniLM-GNN Wei, Yizhong

18 4 artikel
                             83 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland