Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 916 matches
- 2019
- Fardin Abdi, Chien-Ying Chen, Monowar Hasan, Songran Liu, Sibin Mohan, Marco Caccamo:
Preserving Physical Safety Under Cyber Attacks. IEEE Internet Things J. 6(4): 6285-6300 (2019) - Forough Shirin Abkenar, Abbas Jamalipour:
EBA: Energy Balancing Algorithm for Fog-IoT Networks. IEEE Internet Things J. 6(4): 6843-6849 (2019) - Anuoluwapo A. Adewuyi, Hui Cheng, Qi Shi, Jiannong Cao, Áine MacDermott, Xingwei Wang:
CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things. IEEE Internet Things J. 6(3): 5432-5445 (2019) - Emmanuel Ahene, Zhangchi Qin, Akua Konadu Adusei, Fagen Li:
Efficient Signcryption With Proxy Re-Encryption and its Application in Smart Grid. IEEE Internet Things J. 6(6): 9722-9737 (2019) - Muna Al-Hawawreh, Frank T. H. den Hartog, Elena Sitnikova:
Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things. IEEE Internet Things J. 6(4): 7137-7151 (2019) - Thair A. Al-Janabi, Hamed S. Al-Raweshidy:
An Energy Efficient Hybrid MAC Protocol With Dynamic Sleep-Based Scheduling for High Density IoT Networks. IEEE Internet Things J. 6(2): 2273-2287 (2019) - Bilal R. Al-Kaseem, Yousif Al-Dunainawi, Hamed S. Al-Raweshidy:
End-to-End Delay Enhancement in 6LoWPAN Testbed Using Programmable Network Concepts. IEEE Internet Things J. 6(2): 3070-3086 (2019) - Saba Al-Rubaye, Ekhlas Kadhum, Qiang Ni, Alagan Anpalagan:
Industrial Internet of Things Driven by SDN Platform for Smart Grid Resiliency. IEEE Internet Things J. 6(1): 267-277 (2019) - Maha Alaslani, Faisal Nawab, Basem Shihada:
Blockchain in IoT Systems: End-to-End Delay Evaluation. IEEE Internet Things J. 6(5): 8332-8344 (2019) - Mohammed Alasli, Muhammad E. S. Elrabaa, Marwan H. Abu-Amara:
FPGA-Based Symmetric Re-Encryption Scheme to Secure Data Processing for Cloud-Integrated Internet of Things. IEEE Internet Things J. 6(1): 446-457 (2019) - Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abusnaina, Amro Awad, DaeHun Nyang, Aziz Mohaisen:
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach. IEEE Internet Things J. 6(5): 8977-8988 (2019) - Antônio Marcos Alberti, Gabriel Dias Scarpioni, Vaner J. Magalhães, Arismar Cerqueira S. Jr., Joel J. P. C. Rodrigues, Rodrigo da Rosa Righi:
Advancing NovaGenesis Architecture Towards Future Internet of Things. IEEE Internet Things J. 6(1): 215-229 (2019) - Cristina Alcaraz, Mike Burmester, Jorge Cuéllar, Xinyi Huang, Panayiotis Kotzanikolaou, Mihalis Psarakis:
Guest Editorial Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures. IEEE Internet Things J. 6(5): 7988-7991 (2019) - Laha Ale, Ning Zhang, Huici Wu, Dajiang Chen, Tao Han:
Online Proactive Caching in Mobile Edge Computing Using Bidirectional Deep Recurrent Neural Network. IEEE Internet Things J. 6(3): 5520-5530 (2019) - Mohammad Alkhawatrah, Yu Gong, Gaojie Chen, Sangarapillai Lambotharan, Jonathon A. Chambers:
Buffer-Aided Relay Selection for Cooperative NOMA in the Internet of Things. IEEE Internet Things J. 6(3): 5722-5731 (2019) - Ali A. Alnoman, Serhat Erküçük, Alagan Anpalagan:
Sparse Code Multiple Access-Based Edge Computing for IoT Systems. IEEE Internet Things J. 6(4): 7152-7161 (2019) - Ahmed Salim Alrawahi, Kevin Lee, Ahmad Lotfi:
A Multiobjective QoS Model for Trading Cloud of Things Resources. IEEE Internet Things J. 6(6): 9447-9463 (2019) - Alaa A. R. Alsaeedy, Edwin K. P. Chong:
Mobility Management for 5G IoT Devices: Improving Power Consumption With Lightweight Signaling Overhead. IEEE Internet Things J. 6(5): 8237-8247 (2019) - Ahmad Alsharif, Mahmoud Nabil, Ahmed B. T. Sherif, Mohamed Mahmoud, Min Song:
MDMS: Efficient and Privacy-Preserving Multidimension and Multisubset Data Collection for AMI Networks. IEEE Internet Things J. 6(6): 10363-10374 (2019) - Ahmad Alsharif, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, Kemal Akkaya:
EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks. IEEE Internet Things J. 6(2): 3309-3321 (2019) - Dogay Altinel, Gunes Karabulut Kurt:
Modeling of Multiple Energy Sources for Hybrid Energy Harvesting IoT Systems. IEEE Internet Things J. 6(6): 10846-10854 (2019) - Mohab Aly, Foutse Khomh, Yann-Gaël Guéhéneuc, Hironori Washizaki, Soumaya Yacout:
Is Fragmentation a Threat to the Success of the Internet of Things? IEEE Internet Things J. 6(1): 472-487 (2019) - Muhammad Naveed Aman, Mohamed Haroon Basheer, Biplab Sikdar:
Two-Factor Authentication for IoT With Location Information. IEEE Internet Things J. 6(2): 3335-3351 (2019) - Muhammad Naveed Aman, Mohamed Haroon Basheer, Biplab Sikdar:
Data Provenance for IoT With Light Weight Authentication and Privacy Preservation. IEEE Internet Things J. 6(6): 10441-10457 (2019) - Muhammad Naveed Aman, Sachin Taneja, Biplab Sikdar, Kee Chaing Chua, Massimo Alioto:
Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff. IEEE Internet Things J. 6(2): 2843-2859 (2019) - Dimitrios Amaxilatis, Dennis Boldt, Johnny Choque, Luis Díez, Etienne Gandrille, Sokratis Kartakis, Georgios Mylonas, Lasse Steenbock Vestergaard:
Advancing Experimentation-as-a-Service Through Urban IoT Experiments. IEEE Internet Things J. 6(2): 2563-2572 (2019) - Jonggwan An, Franck Le Gall, Jaeho Kim, Jaeseok Yun, Jaeyoung Hwang, Martin Bauer, Mengxuan Zhao, Jaeseung Song:
Toward Global IoT-Enabled Smart Cities Interworking Using Adaptive Semantic Adapter. IEEE Internet Things J. 6(3): 5753-5765 (2019) - Jian An, Danwei Liang, Xiaolin Gui, He Yang, Ruowei Gui, Xin He:
Crowdsensing Quality Control and Grading Evaluation Based on a Two-Consensus Blockchain. IEEE Internet Things J. 6(3): 4711-4718 (2019) - Mohamed G. Anany, Mahmoud M. Elmesalawy, Ahmed M. Abd El-Haleem:
Matching Game-Based Cell Association in Multi-RAT HetNet Considering Device Requirements. IEEE Internet Things J. 6(6): 9774-9782 (2019) - Pilar Andres-Maldonado, Mads Lauridsen, Pablo Ameigeiras, Juan M. López-Soler:
Analytical Modeling and Experimental Validation of NB-IoT Device Energy Consumption. IEEE Internet Things J. 6(3): 5691-5701 (2019)
skipping 886 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-19 14:41 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint