Data mining
S. Hong
|
13 |
1997 |
13
1997
|
Internet of Things (IoT): A vision, architectural elements, and future directions
J. Gubbi,
R. Buyya,
S. Marusic,
M. Palaniswami
|
13 |
2012 |
13
2012
|
Harris hawks optimization: Algorithm and applications
Ali Asghar Heidari,
S. Mirjalili,
Hossam Faris,
Ibrahim Aljarah,
Majdi M. Mafarja,
Huiling Chen
|
12 |
2019 |
12
2019
|
MAX-MIN Ant System
T. Stützle,
H. Hoos
|
11 |
2000 |
11
2000
|
Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing
A. Beloglazov,
J. Abawajy,
R. Buyya
|
11 |
2012 |
11
2012
|
Slime mould algorithm: A new method for stochastic optimization
Shimin Li,
Huiling Chen,
Mingjing Wang,
Ali Asghar Heidari,
S. Mirjalili
|
11 |
2020 |
11
2020
|
Integration of Cloud computing and Internet of Things: A survey
A. Botta,
Walter de Donato,
V. Persico,
A. Pescapé
|
10 |
2016 |
10
2016
|
Addressing cloud computing security issues
Dimitrios Zissis,
D. Lekkas
|
10 |
2012 |
10
2012
|
Mining generalized association rules
R. Srikant,
R. Agrawal
|
10 |
1995 |
10
1995
|
IoT security: Review, blockchain solutions, and open challenges
M. Khan,
K. Salah
|
10 |
2017 |
10
2017
|
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
R. Buyya,
Chee Shin Yeo,
S. Venugopal,
J. Broberg,
I. Brandić
|
10 |
2009 |
10
2009
|
Mobile cloud computing: A survey
Niroshinie Fernando,
S. Loke,
Wenny Rahayu
|
10 |
2013 |
10
2013
|
Solving unsymmetric sparse systems of linear equations with PARDISO
O. Schenk,
K. Gärtner
|
10 |
2002 |
10
2002
|
The network weather service: a distributed resource performance forecasting service for metacomputing
R. Wolski,
N. Spring,
J. Hayes
|
10 |
1999 |
10
1999
|
A Survey on the Security of Blockchain Systems
Xiaoqi Li,
Peng Jiang,
Ting Chen,
Xiapu Luo,
Q. Wen
|
10 |
2017 |
10
2017
|
Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset
Nickolaos Koroniotis,
Nour Moustafa,
E. Sitnikova,
B. Turnbull
|
10 |
2018 |
10
2018
|
Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges
R. Román,
Javier López,
M. Mambo
|
10 |
2016 |
10
2016
|
A survey on security and privacy of federated learning
Viraaji Mothukuri,
R. Parizi,
Seyedamin Pouriyeh,
Yan-ping Huang,
A. Dehghantanha,
Gautam Srivastava
|
9 |
2021 |
9
2021
|