Search Results - "Computer networks (Amsterdam, Netherlands : 1999)"

Refine Results
  1. 1

    6G networks: Beyond Shannon towards semantic and goal-oriented communications by Calvanese Strinati, Emilio, Barbarossa, Sergio

    “…The goal of this paper is to promote the idea that including semantic and goal-oriented aspects in future 6G networks can produce a significant leap forward in…”
    Get full text
    Journal Article
  2. 2

    Building an efficient intrusion detection system based on feature selection and ensemble classifier by Zhou, Yuyang, Cheng, Guang, Jiang, Shanqing, Dai, Mian

    “…Intrusion detection system (IDS) is one of extensively used techniques in a network topology to safeguard the integrity and availability of sensitive assets in…”
    Get full text
    Journal Article
  3. 3

    Cyber-security on smart grid: Threats and potential solutions by Gunduz, Muhammed Zekeriya, Das, Resul

    “…The smart grid is one of the most significant applications of the Internet of Things (IoT). As information and communication technologies (ICT) developed and…”
    Get full text
    Journal Article
  4. 4

    Clustering objectives in wireless sensor networks: A survey and research direction analysis by Shahraki, Amin, Taherkordi, Amir, Haugen, Øystein, Eliassen, Frank

    “…Wireless Sensor Networks (WSNs) typically include thousands of resource-constrained sensors to monitor their surroundings, collect data, and transfer it to…”
    Get full text
    Journal Article
  5. 5

    Towards smart factory for industry 4.0: a self-organized multi-agent system with big data based feedback and coordination by Wang, Shiyong, Wan, Jiafu, Zhang, Daqiang, Li, Di, Zhang, Chunhua

    “…The proliferation of cyber-physical systems introduces the fourth stage of industrialization, commonly known as Industry 4.0. The vertical integration of…”
    Get full text
    Journal Article
  6. 6

    IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture by Vasan, Danish, Alazab, Mamoun, Wassan, Sobia, Naeem, Hamad, Safaei, Babak, Zheng, Qin

    “…The volume, type, and sophistication of malware is increasing. Deep convolutional neural networks (CNNs) have lately proven their effectiveness in malware…”
    Get full text
    Journal Article
  7. 7

    A comprehensive survey of Network Function Virtualization by Yi, Bo, Wang, Xingwei, Li, Keqin, Das, Sajal k., Huang, Min

    “…Today’s networks are filled with a massive and ever-growing variety of network functions that coupled with proprietary devices, which leads to network…”
    Get full text
    Journal Article
  8. 8

    Internet of Things: A survey on machine learning-based intrusion detection approaches by da Costa, Kelton A.P., Papa, João P., Lisboa, Celso O., Munoz, Roberto, de Albuquerque, Victor Hugo C.

    “…In the world scenario, concerns with security and privacy regarding computer networks are always increasing. Computer security has become a necessity due to…”
    Get full text
    Journal Article
  9. 9

    SURVIVOR: A blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment by Jindal, Anish, Aujla, Gagangeet Singh, Kumar, Neeraj

    “…Electric vehicles (EVs) have transformed the smart transportation sector by providing diverse energy management solutions to the smart grid. Energy trading…”
    Get full text
    Journal Article
  10. 10

    Wireless Sensor Networks and Multi-UAV systems for natural disaster management by Erdelj, Milan, Król, Michał, Natalizio, Enrico

    “…This work identifies the role of Wireless Sensor Networks (WSN) and Unmanned Aerial Vehicles (UAV) in the context of natural disaster management. Main…”
    Get full text
    Journal Article
  11. 11

    5G roadmap: 10 key enabling technologies by Akyildiz, Ian F., Nie, Shuai, Lin, Shih-Chun, Chandrasekaran, Manoj

    “…The fifth generation (5G) mobile communication networks will require a major paradigm shift to satisfy the increasing demand for higher data rates, lower…”
    Get full text
    Journal Article
  12. 12

    MIMETIC: Mobile encrypted traffic classification using multimodal deep learning by Aceto, Giuseppe, Ciuonzo, Domenico, Montieri, Antonio, Pescapè, Antonio

    “…Mobile Traffic Classification (TC) has become nowadays the enabler for valuable profiling information, other than being the workhorse for service…”
    Get full text
    Journal Article
  13. 13

    Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic by Elmasry, Wisam, Akbulut, Akhan, Zaim, Abdul Halim

    “…The prevention of intrusion is deemed to be a cornerstone of network security. Although excessive work has been introduced on network intrusion detection in…”
    Get full text
    Journal Article
  14. 14

    Cloud-assisted Industrial Internet of Things (IIoT) – Enabled framework for health monitoring by Hossain, M. Shamim, Muhammad, Ghulam

    “…The promising potential of the emerging Internet of Things (IoT) technologies for interconnected medical devices and sensors has played an important role in…”
    Get full text
    Journal Article
  15. 15

    Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks by Li, Xiong, Ibrahim, Maged Hamada, Kumari, Saru, Sangaiah, Arun Kumar, Gupta, Vidushi, Choo, Kim-Kwang Raymond

    “…Wireless body area networks (WBANs) are used to collect and exchange vital and sensitive information about the physical conditions of patients. Due to the…”
    Get full text
    Journal Article
  16. 16

    Personalized federated learning framework for network traffic anomaly detection by Pei, Jiaming, Zhong, Kaiyang, Jan, Mian Ahmad, Li, Jinhai

    “…With the widespread use of real-time sensors in various fields, such as IoT systems, it is important to improve the performance of most network traffic anomaly…”
    Get full text
    Journal Article
  17. 17

    Topology optimization against cascading failures on wireless sensor networks using a memetic algorithm by Fu, Xiuwen, Pace, Pasquale, Aloi, Gianluca, Yang, Lin, Fortino, Giancarlo

    “…Existing research on cascading failures of wireless sensor networks (WSNs) fails to take into account the role of the sink node on network load distribution,…”
    Get full text
    Journal Article
  18. 18

    A survey on security and privacy issues of UAVs by Mekdad, Yassine, Aris, Ahmet, Babun, Leonardo, Fergougui, Abdeslam El, Conti, Mauro, Lazzeretti, Riccardo, Uluagac, A. Selcuk

    “…In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs), has witnessed a rapid increase with its large number of airspace…”
    Get full text
    Journal Article
  19. 19

    A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT by Fotouhi, Mahdi, Bayat, Majid, Das, Ashok Kumar, Far, Hossein Abdi Nasib, Pournaghi, S. Morteza, Doostari, M.A.

    “…The widespread use of mobile devices, sensors, and wireless sensor networks and the progressive development of the Internet of Things (IoT) has motivated…”
    Get full text
    Journal Article
  20. 20

    Intrusion detection systems in the Internet of things: A comprehensive investigation by Hajiheidari, Somayye, Wakil, Karzan, Badri, Maryam, Navimipour, Nima Jafari

    “…Recently, a new dimension of intelligent objects has been provided by reducing the power consumption of electrical appliances. Daily physical objects have been…”
    Get full text
    Journal Article