nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-based data transaction method with privacy protection and fairness
|
Yuan, Ye |
|
|
18 |
4 |
|
artikel |
2 |
Adaptive meta-learning for denial-of-service defense
|
Salim, Salmi |
|
|
18 |
4 |
|
artikel |
3 |
A hybrid reinforcement learning approach for multipath routing optimization in software-defined networks
|
Hassen, Houda |
|
|
18 |
4 |
|
artikel |
4 |
A hybrid shuffled frog-leaping scheduling algorithm for power management of directional sensor networks
|
Mokaripoor, Peyman |
|
|
18 |
4 |
|
artikel |
5 |
AI-driven proactive security defense in distributed iov systems: Cyber threat intelligence modeling for connected autonomous vehicles
|
Wang, Yinghui |
|
|
18 |
4 |
|
artikel |
6 |
A lightweight biometric-assisted authentication approach for internet of things
|
Rahmani, Kamal |
|
|
18 |
4 |
|
artikel |
7 |
A model for SLA aware admission control and QoS aware task scheduling in cloud environment
|
Jain, Richa |
|
|
18 |
4 |
|
artikel |
8 |
A multi-notary cross-chain system with supervision and identity tracking
|
Liang, Hai |
|
|
18 |
4 |
|
artikel |
9 |
An effective meta-heuristics for trajectory planning problem in UAV-assisted vessel emission detection system
|
Zhu, Jie |
|
|
18 |
4 |
|
artikel |
10 |
An efficient certificateless signcryption for mutual and batch authentication in Vehicular Ad-hoc Networks (VANETs)
|
Chiang, Wei-Kuo |
|
|
18 |
4 |
|
artikel |
11 |
An enhanced attention and dilated convolution-based ensemble model for network intrusion detection system against adversarial evasion attacks
|
Awad, Omer Fawzi |
|
|
18 |
4 |
|
artikel |
12 |
An in-depth analysis of computation offloading approaches in multi-access edge computing systems
|
Lokavarapu, V Srinivas |
|
|
18 |
4 |
|
artikel |
13 |
A novel approach for ensuring drug safety in the pharmaceutical supply Chain by using IoT devices and blockchain technology
|
Pranitha, Gadde |
|
|
18 |
4 |
|
artikel |
14 |
A privacy-preserving hybrid ensemble classifier using decision tree and naïve bayes approach for federated learning
|
M, Vaishnavi |
|
|
18 |
4 |
|
artikel |
15 |
A robust and efficient blockchain-based framework for updating firmware in IoT environments
|
Yohan, Alexander |
|
|
18 |
4 |
|
artikel |
16 |
A secure and resource-efficient authenticated key agreement framework for mobile edge computing
|
Tanveer, Muhammad |
|
|
18 |
4 |
|
artikel |
17 |
A security enhanced certificateless aggregate signcryption scheme for VANETs
|
Liu, Dong |
|
|
18 |
4 |
|
artikel |
18 |
A standard-driven framework for blockchain security risk assessment
|
Boughdiri, Maher |
|
|
18 |
4 |
|
artikel |
19 |
A state machine-based mobility model for UAVs supporting VANETs
|
Bouchrit, Leila |
|
|
18 |
4 |
|
artikel |
20 |
Attentional value-factorization-based resource allocation and performance evaluation for intelligent connected vehicles
|
Cai, Chao |
|
|
18 |
4 |
|
artikel |
21 |
BCT-FLHD: A blockchain-enabled federated learning framework for healthcare 5.0 disease detection
|
Tiwari, Kajal |
|
|
18 |
4 |
|
artikel |
22 |
Blockchain and federated learning based on aggregation techniques for industrial IoT: A contemporary survey
|
Shawkat, Mai |
|
|
18 |
4 |
|
artikel |
23 |
Blockchain and homomorphic encryption based system for secure supply chain network against counterfeit drugs
|
Agarwal, Udit |
|
|
18 |
4 |
|
artikel |
24 |
Blockchain-based decentralized identifier in metaverse environment for secure and privacy-preserving authentication with improved key management and cryptosystem
|
S, Vijitha |
|
|
18 |
4 |
|
artikel |
25 |
Blockchain based deep learning model for the security in industrial internet of things
|
M, Tejeswara Kumar |
|
|
18 |
4 |
|
artikel |
26 |
Blockchain-enabled secured supply chain for smart cities: A systematic review on architecture, technology, and service management
|
Samantray, Bhabani Sankar |
|
|
18 |
4 |
|
artikel |
27 |
Blockchain-powered trust management methodology in SIoT: A survey
|
Jmal, Raouf |
|
|
18 |
4 |
|
artikel |
28 |
Blockchain technology for digital twin security in smart grids using interpretable generalized additive neural networks
|
Suggala, Ravi Kumar |
|
|
18 |
4 |
|
artikel |
29 |
CAT: A simple heterogeneous ensemble learning framework for network intrusion detection
|
Zhang, Zheng |
|
|
18 |
4 |
|
artikel |
30 |
Combating evolving threats: A robust malicious domain detection framework for distributed networks
|
Jin, Yinuo |
|
|
18 |
4 |
|
artikel |
31 |
Content caching in relay-assisted D2D communications using robust combinatorial optimization
|
Al-Balaghee, Ali |
|
|
18 |
4 |
|
artikel |
32 |
Correction to: Classification of intrusion using Multi-Stream Generative Adversarial Networks in Wireless Sensor Networks
|
Prabakar, D. |
|
|
18 |
4 |
|
artikel |
33 |
Corrigendum to “SE-LAKAF: Security Enhanced Lightweight Authentication and Key Agreement Framework for Smart Grid Network”
|
Cao, Zhengjun |
|
|
18 |
4 |
|
artikel |
34 |
Creating a realistic sybil attack dataset for inter-vehicle communication
|
Guven, Taner |
|
|
18 |
4 |
|
artikel |
35 |
Cross-domain secure communication scheme in industrial internet of things based on consortium blockchain
|
Han, Gang |
|
|
18 |
4 |
|
artikel |
36 |
Cryptanalysis and enhancement of a quantum-secure two-party authentication protocol for mobile devices
|
Saeidi, Mohammad Reza |
|
|
18 |
4 |
|
artikel |
37 |
CuraFrame: a patient-centric secure and privacy preserving medical framework with zero-leak using blockchain
|
Vishwakarma, Lokendra |
|
|
18 |
4 |
|
artikel |
38 |
Data security and access control method of blockchain with revocable attribute encryption in steel supply chain
|
Gao, Jie |
|
|
18 |
4 |
|
artikel |
39 |
Deadline-aware workload scheduling for edge-enhanced iot devices: A blockchain-enabled approach to incentive-based computing
|
Chaudhry, Muhammad Tayyab |
|
|
18 |
4 |
|
artikel |
40 |
Deep learning and blockchain-based secure authentication protocol for privacy protection in cloud environments
|
Subbarayan, Kalaiselvi |
|
|
18 |
4 |
|
artikel |
41 |
Design and optimization of intelligent sports IoT system based on big data and quantum computing
|
Zhang, Yang |
|
|
18 |
4 |
|
artikel |
42 |
DPSLS: an efficient local search algorithm for pure MaxSAT
|
Zhou, Huisi |
|
|
18 |
4 |
|
artikel |
43 |
Dynamic sharding mechanism for vehicle networking to ensure load balancing and data reliability
|
Du, Zhiqiang |
|
|
18 |
4 |
|
artikel |
44 |
EESDA: Energy-Efficient And Secure Data Aggregation Protocol for IoT
|
N, Sheena |
|
|
18 |
4 |
|
artikel |
45 |
EMKPPA: Efficient multi-key privacy-preserving aggregation in federated learning
|
Liu, Zhen |
|
|
18 |
4 |
|
artikel |
46 |
Encoder only attention-guided transformer framework for accurate and explainable social media fake profile detection
|
Shukla, Prashant Kumar |
|
|
18 |
4 |
|
artikel |
47 |
Energy aware DBSCAN and mobility aware balanced q-learning based opportunistic routing protocol in MANET
|
Das, A. Daniel Gurwin |
|
|
18 |
4 |
|
artikel |
48 |
Enhanced QoS-aware secure routing protocol for WAHNs using advanced fast double decker new binary archimedes kepler pure convolutional transformer network and cryptographic techniques
|
Khagga, Vijayalakshmi |
|
|
18 |
4 |
|
artikel |
49 |
Ensemble bagging-based classifier for eavesdropper detection in 6G wireless networks
|
Mohan, Swethambri |
|
|
18 |
4 |
|
artikel |
50 |
Exploring equivariant and invariant features for website fingerprinting in distributed networks
|
Li, Jiajun |
|
|
18 |
4 |
|
artikel |
51 |
Federated active meta-learning with blockchain for zero-day attack detection in industrial IoT
|
Kumar, Kapil |
|
|
18 |
4 |
|
artikel |
52 |
Heterogeneous signcryption scheme from CLC to IBC for IIoT
|
Jin, Chunhua |
|
|
18 |
4 |
|
artikel |
53 |
Hybrid key management WSN protocol to enhance network performance using ML techniques for IoT application in cloud environment
|
M, Raghini |
|
|
18 |
4 |
|
artikel |
54 |
Hybrid optimization and deep learning for enhancing accuracy in fraud detection using big data techniques
|
Hu, Jingchao |
|
|
18 |
4 |
|
artikel |
55 |
Integrating request stochasticity for efficient resource placement in general edge architecture with no level limit
|
Gao, Jimei |
|
|
18 |
4 |
|
artikel |
56 |
Intrusion detection system for Denial of Service (DoS) attacks in healthcare cybersecurity on System on Chip (SoC) – PYTHON productivity for ZYNQ (PYNQ Z1)
|
Sridevi, A. |
|
|
18 |
4 |
|
artikel |
57 |
IoT data caching and scheduling in heterogeneous mobile networks by exploiting mobility and transient data characteristics
|
Mousavi Jalali, Seyedeh Maryam |
|
|
18 |
4 |
|
artikel |
58 |
Joint optimization of roadside unit deployment and connected vehicle routing for emergency information propagation
|
Ren, Yining |
|
|
18 |
4 |
|
artikel |
59 |
LEFAM: Lightweight scalable efficient failover authentication mechanism for fog-based IoT environment
|
Abdussami, Mohammad |
|
|
18 |
4 |
|
artikel |
60 |
Lightweight batch tamper proof detection for anonymous outsourced data in cloud-assisted industrial internet of things
|
Liu, Bingyun |
|
|
18 |
4 |
|
artikel |
61 |
Message digest and blockchain based chaotic ordered cyber secured cloud of things for smart health care
|
Munnangi, Ashok Kumar |
|
|
18 |
4 |
|
artikel |
62 |
MHQoS: A multi-user hierarchical quality of service optimization for P2P storage
|
Zhao, Jingzhe |
|
|
18 |
4 |
|
artikel |
63 |
Minecrafter: A secure and decentralized consensus protocol for blockchain-enabled vaccine supply chain
|
Maloth, Sreenu |
|
|
18 |
4 |
|
artikel |
64 |
Mitigating DDoS attacks on the internet of things using federated learning
|
Shirvani, Ghazaleh |
|
|
18 |
4 |
|
artikel |
65 |
Mitigation of selfish mining attack using dynamic difficulty adjustment algorithm
|
Patil, Shriniwas |
|
|
18 |
4 |
|
artikel |
66 |
Multifactor SM9 blind signature large models data privacy preservation approach
|
Zhang, Jiazheng |
|
|
18 |
4 |
|
artikel |
67 |
Multi-layered retrieval integrity verification mechanism for blockchain oracle
|
Wu, Rui |
|
|
18 |
4 |
|
artikel |
68 |
Optimal hybrid energy-saving cluster head selection for wireless sensor networks: an empirical study
|
Lonkar, Bhupesh |
|
|
18 |
4 |
|
artikel |
69 |
Optimized energy-efficient routing in agriculture using wireless sensor networks
|
Lavanya, Y. |
|
|
18 |
4 |
|
artikel |
70 |
Pivacy-preserving federated learning based on multi-key fully homomorphic encryption and trusted execution environment
|
Liu, Gang |
|
|
18 |
4 |
|
artikel |
71 |
Privacy preserving hierarchical federated learning approach for secure urban mobility prediction
|
Naresh, Vankamamidi S. |
|
|
18 |
4 |
|
artikel |
72 |
Proof of time offset: Blockchain consensus for resource constrained environments
|
Gugnani, Pankaj |
|
|
18 |
4 |
|
artikel |
73 |
PTSC: an efficient random boolean consensus algorithm for distributed systems with the probabilistic propagation model
|
Cao, Yuke |
|
|
18 |
4 |
|
artikel |
74 |
Reinforcement learning-driven temporal knowledge graph reasoning for secure data provenance in distributed networks
|
Qiu, Yunxiang |
|
|
18 |
4 |
|
artikel |
75 |
Secure and efficient fully dynamic group signature based on RSIS and RLWE
|
Pareek, Vishal |
|
|
18 |
4 |
|
artikel |
76 |
Starkburger-game-based real-time pricing method for energy transactions in smart grid
|
Sun, Jun |
|
|
18 |
4 |
|
artikel |
77 |
STP: a permissioned blockchain solution for dynamic pricing and traceability in food supply chain
|
Rani, Pritam |
|
|
18 |
4 |
|
artikel |
78 |
The future of misinformation control: integrating advanced algorithms and Blockchain for effective Deepfake detection
|
Xu, Shiyou |
|
|
18 |
4 |
|
artikel |
79 |
The security and vulnerability issues of blockchain technology: A SWOC analysis
|
Punia, Aarti |
|
|
18 |
4 |
|
artikel |
80 |
Towards precision agriculture: utilizing IoT and deep learning for automatic farm fire detection and extinguishing
|
Khatri, Aanchal |
|
|
18 |
4 |
|
artikel |
81 |
User satisfaction aware edge server utilization enhancement in mobile edge computing
|
Chen, Liqiong |
|
|
18 |
4 |
|
artikel |
82 |
ValidCertify: an effective blockchain-based domain certificate authentication and verification scheme
|
Kadam, Priyanka Amol |
|
|
18 |
4 |
|
artikel |
83 |
WIVIM: Web Injection Vulnerabilities Detection Based on Interprocedural Analysis and MiniLM-GNN
|
Wei, Yizhong |
|
|
18 |
4 |
|
artikel |