Works matching IS 21613915 AND DT 2024 AND VI 35 AND IP 5
Results: 11
A group key agreement protocol for Vanet based on Chinese remainder theorem and blockchain.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2024, v. 35, n. 5, p. 1, doi. 10.1002/ett.4987
- By:
- Publication type:
- Article
Enhanced authentication and device integrity protection for GDOI using blockchain.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2024, v. 35, n. 5, p. 1, doi. 10.1002/ett.4986
- By:
- Publication type:
- Article
Sensitive data identification for multi‐category and multi‐scenario data.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2024, v. 35, n. 5, p. 1, doi. 10.1002/ett.4983
- By:
- Publication type:
- Article
Correction to "Multi‐objective metaheuristic optimization‐based clustering with network slicing technique for internet of things‐enabled wireless sensor networks in 5G systems".
- Published in:
- 2024
- Publication type:
- Correction Notice
Reinforcement learning based blockchain model for revoking unauthorized access in Virtualized Network Functions‐based Internet of Things Mobile Edge Computing.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2024, v. 35, n. 5, p. 1, doi. 10.1002/ett.4981
- By:
- Publication type:
- Article
A greedy randomized adaptive search procedure for scheduling IoT tasks in virtualized fog–cloud computing.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2024, v. 35, n. 5, p. 1, doi. 10.1002/ett.4980
- By:
- Publication type:
- Article
A generalized detection framework for covert timing channels based on perceptual hashing.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2024, v. 35, n. 5, p. 1, doi. 10.1002/ett.4978
- By:
- Publication type:
- Article
A secure routing protocol using trust‐based clustering and bionic intelligence algorithm for UAV‐assisted vehicular ad hoc networks.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2024, v. 35, n. 5, p. 1, doi. 10.1002/ett.4977
- By:
- Publication type:
- Article
Crossover Boosted Grey Wolf Optimizer‐based framework for leader election and resource allocation in Intrusion Detection Systems for MANETs.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2024, v. 35, n. 5, p. 1, doi. 10.1002/ett.4974
- By:
- Publication type:
- Article
An advancing method for web service reliability and scalability using ResNet convolution neural network optimized with Zebra Optimization Algorithm.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2024, v. 35, n. 5, p. 1, doi. 10.1002/ett.4968
- By:
- Publication type:
- Article
Issue Information.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2024, v. 35, n. 5, p. 1, doi. 10.1002/ett.4781
- Publication type:
- Article