1 | -- | 0 | Antonio Coronato, Juan Carlos Augusto. Editorial |
3 | -- | 17 | Xiaoxiao Sun, Yijie Wei, Hujun Shen. Blockchain-based collaborative business process data sharing and access control |
19 | -- | 44 | Saeedeh Ghanadbashi, Zahra Safavifar, Farshad Taebi, Fatemeh Golpayegani. Handling uncertainty in self-adaptive systems: an ontology-based reinforcement learning model |
19 | -- | 44 | Saeedeh Ghanadbashi, Zahra Safavifar, Farshad Taebi, Fatemeh Golpayegani. Handling uncertainty in self-adaptive systems: an ontology-based reinforcement learning model |
45 | -- | 54 | Shadi Abudalfa, Kevin Bouchard. Two-stage RFID approach for localizing objects in smart homes based on gradient boosted decision trees with under- and over-sampling |
45 | -- | 54 | Shadi Abudalfa, Kevin Bouchard. Two-stage RFID approach for localizing objects in smart homes based on gradient boosted decision trees with under- and over-sampling |
55 | -- | 71 | Rahul Das, Mona Dwivedi. Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSN |
73 | -- | 91 | Zinah Hussein Toman, Lazhar Hamel, Sarah Hussein Toman, Mohamed Graiet, Dalton Cézane Gomes Valadares. Formal verification for security and attacks in IoT physical layer |
73 | -- | 91 | Zinah Hussein Toman, Lazhar Hamel, Sarah Hussein Toman, Mohamed Graiet, Dalton Cézane Gomes Valadares. Formal verification for security and attacks in IoT physical layer |
93 | -- | 104 | Youssef Baddi, Anass Sebbar, Karim Zkik, Yassin Maleh, Faysal Bensalah, Mohammed Boulmalf. MSDN-IoT multicast group communication in IoT based on software defined networking |