| Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications |
72 |
| A new prediction model of battery and wind-solar output in hybrid power system |
71 |
| The visual object tracking algorithm research based on adaptive combination kernel |
68 |
| The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems |
44 |
| Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network |
40 |
| Digital twin-driven manufacturing cyber-physical system for parallel controlling of smart workshop |
39 |
| Developing brain abnormality recognize system using multi-objective pattern producing neural network |
32 |
| Detecting crypto-ransomware in IoT networks based on energy consumption footprint |
30 |
| Remote patient monitoring: a comprehensive study |
30 |
| Industry 4.0 framework for management and operations: a review |
29 |
| Improved salp swarm algorithm based on particle swarm optimization for feature selection |
28 |
| Linguistic single-valued neutrosophic prioritized aggregation operators and their applications to multiple-attribute group decision-making |
27 |
| Sparse network embedding for community detection and sign prediction in signed social networks |
23 |
| Bipolar fuzzy Dombi aggregation operators and its application in multiple-attribute decision-making process |
23 |
| Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment |
22 |
| An application framework of digital twin and its case study |
21 |
| A methodology for deployment of IoT application in fog |
21 |
| A new agent-based method for QoS-aware cloud service composition using particle swarm optimization algorithm |
20 |
| A trust-based collaborative filtering algorithm for E-commerce recommendation system |
20 |
| Base belief function: an efficient method of conflict management |
20 |
| A lightweight decentralized service placement policy for performance optimization in fog computing |
19 |
| An efficient Swarm-Intelligence approach for task scheduling in cloud-based internet of things applications |
19 |
| Neutrosophic AHP-Delphi Group decision making model based on trapezoidal neutrosophic numbers |
18 |
| Hybrid meta-heuristic optimization based home energy management system in smart grid |
18 |
| Metamodel for integration of Internet of Things, Social Networks, the Cloud and Industry 4.0 |
16 |
| A hybrid intelligent model for assessment of critical success factors in high-risk emergency system |
16 |
| Real time indoor localization integrating a model based pedestrian dead reckoning on smartphone and BLE beacons |
16 |
| A machine learning based approach for phishing detection using hyperlinks information |
14 |
| Load frequency control of autonomous power system using adaptive fuzzy based PID controller optimized on improved sine cosine algorithm |
14 |
| A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud |
14 |
| ACO optimized self-organized tree-based energy balance algorithm for wireless sensor network |
14 |
| Some single-valued neutrosophic Bonferroni power aggregation operators in multiple attribute decision making |
14 |
| Artificial neural network based classification of lung nodules in CT images using intensity, shape and texture features |
13 |
| Vision-based patient monitoring: a comprehensive review of algorithms and technologies |
13 |
| Heart rate variability as a predictive biomarker of thermal comfort |
13 |
| Fog-assisted personalized healthcare-support system for remote patients with diabetes |
13 |
| FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks |
13 |
| Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems |
13 |
| Security risk assessment framework for smart car using the attack tree analysis |
13 |
| A personalized recommendation system with combinational algorithm for online learning |
13 |
| Cloud-centric IoT based student healthcare monitoring framework |
13 |
| IoT device security based on proxy re-encryption |
12 |
| kROp: k-Means clustering based routing protocol for opportunistic networks |
12 |
| Wireless sensor network routing method based on improved ant colony algorithm |
12 |
| An intelligent lung cancer diagnosis system using cuckoo search optimization and support vector machine classifier |
12 |
| Digital twin for CNC machine tool: modeling and using strategy |
12 |
| Modular based flexible digital twin for factory design |
12 |
| A simulation-based approach for plant layout design and production planning |
12 |
| Robust global motion estimation for video security based on improved k-means clustering |
12 |
| Online human movement classification using wrist-worn wireless sensors |
12 |