nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT
|
Yang, Jen-Ho |
|
|
2023 |
1 |
|
artikel |
2 |
Correction: Mobile authentication of copy detection patterns
|
Taran, Olga |
|
|
2023 |
1 |
|
artikel |
3 |
Gaussian class-conditional simplex loss for accurate, adversarially robust deep classifier training
|
Ali, Arslan |
|
|
2023 |
1 |
|
artikel |
4 |
Image life trails based on contrast reduction models for face counter-spoofing
|
Katika, Balaji Rao |
|
|
2023 |
1 |
|
artikel |
5 |
Mobile authentication of copy detection patterns
|
Taran, Olga |
|
|
2023 |
1 |
|
artikel |
6 |
Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTM
|
Wang, Xiaoning |
|
|
2023 |
1 |
|
artikel |
7 |
Network traffic classification model based on attention mechanism and spatiotemporal features
|
Hu, Feifei |
|
|
2023 |
1 |
|
artikel |
8 |
RETRACTED ARTICLE: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks
|
Wang, Dan |
|
|
2023 |
1 |
|
artikel |
9 |
RETRACTED ARTICLE: Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN
|
Li, Ming |
|
|
2023 |
1 |
|
artikel |
10 |
RETRACTED ARTICLE: The design of network security protection trust management system based on an improved hidden Markov model
|
Chen, Shaojun |
|
|
2023 |
1 |
|
artikel |
11 |
Robust JPEG steganography based on the robustness classifier
|
Zhang, Jimin |
|
|
2023 |
1 |
|
artikel |
12 |
User authentication and access control to blockchain-based forensic log data
|
Islam, Md. Ezazul |
|
|
2023 |
1 |
|
artikel |