Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             11 results found
no title author magazine year volume issue page(s) type
1 An efficient flow-based multi-level hybrid intrusion detection system for software-defined networks Latah, Majd

3 3-4 p. 261-271
article
2 A trusted recommendation scheme for privacy protection based on federated learning Wang, Yichuan

3 3-4 p. 218-228
article
3 Blockchain-driven anomaly detection framework on edge intelligence Xie, Xueshuo

3 3-4 p. 171-192
article
4 Cooperative abnormal sound event detection in end-edge-cloud orchestrated systems Wang, Jingrong

3 3-4 p. 158-170
article
5 ECAS: an efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks Qin, Zhiguang

3 3-4 p. 205-217
article
6 Editorial of CCF transactions on networking: special issue on intelligence-enabled end-edge-cloud orchestrated computing Ren, Ju

3 3-4 p. 155-157
article
7 Energy efficient broadcast protocol for Underwater Wireless Sensor Networks Touzene, Abderezak

3 3-4 p. 1-10
article
8 Performance analysis of hybrid SAC-OCDMA-OFDM model over free space optical communication Bhanja, Urmila

3 3-4 p. 272-285
article
9 Proof of outsourced encryption: cross verification of security service level agreement Alasmari, Sultan

3 3-4 p. 229-244
article
10 QoE evaluation of dynamic adaptive streaming over HTTP (DASH) with promising transport layer protocols Khan, Koffka

3 3-4 p. 245-260
article
11 Towards fair and efficient task allocation in blockchain-based crowdsourcing Pang, Xiaoyi

3 3-4 p. 193-204
article
                             11 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands