Search Results - "Computer networks (Amsterdam, Netherlands : 1999)"
-
1
6G networks: Beyond Shannon towards semantic and goal-oriented communications
Published in Computer networks (Amsterdam, Netherlands : 1999) (08-05-2021)“…The goal of this paper is to promote the idea that including semantic and goal-oriented aspects in future 6G networks can produce a significant leap forward in…”
Get full text
Journal Article -
2
Building an efficient intrusion detection system based on feature selection and ensemble classifier
Published in Computer networks (Amsterdam, Netherlands : 1999) (19-06-2020)“…Intrusion detection system (IDS) is one of extensively used techniques in a network topology to safeguard the integrity and availability of sensitive assets in…”
Get full text
Journal Article -
3
Cyber-security on smart grid: Threats and potential solutions
Published in Computer networks (Amsterdam, Netherlands : 1999) (14-03-2020)“…The smart grid is one of the most significant applications of the Internet of Things (IoT). As information and communication technologies (ICT) developed and…”
Get full text
Journal Article -
4
Clustering objectives in wireless sensor networks: A survey and research direction analysis
Published in Computer networks (Amsterdam, Netherlands : 1999) (24-10-2020)“…Wireless Sensor Networks (WSNs) typically include thousands of resource-constrained sensors to monitor their surroundings, collect data, and transfer it to…”
Get full text
Journal Article -
5
Towards smart factory for industry 4.0: a self-organized multi-agent system with big data based feedback and coordination
Published in Computer networks (Amsterdam, Netherlands : 1999) (04-06-2016)“…The proliferation of cyber-physical systems introduces the fourth stage of industrialization, commonly known as Industry 4.0. The vertical integration of…”
Get full text
Journal Article -
6
IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture
Published in Computer networks (Amsterdam, Netherlands : 1999) (22-04-2020)“…The volume, type, and sophistication of malware is increasing. Deep convolutional neural networks (CNNs) have lately proven their effectiveness in malware…”
Get full text
Journal Article -
7
A comprehensive survey of Network Function Virtualization
Published in Computer networks (Amsterdam, Netherlands : 1999) (14-03-2018)“…Today’s networks are filled with a massive and ever-growing variety of network functions that coupled with proprietary devices, which leads to network…”
Get full text
Journal Article -
8
Internet of Things: A survey on machine learning-based intrusion detection approaches
Published in Computer networks (Amsterdam, Netherlands : 1999) (14-03-2019)“…In the world scenario, concerns with security and privacy regarding computer networks are always increasing. Computer security has become a necessity due to…”
Get full text
Journal Article -
9
SURVIVOR: A blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment
Published in Computer networks (Amsterdam, Netherlands : 1999) (22-04-2019)“…Electric vehicles (EVs) have transformed the smart transportation sector by providing diverse energy management solutions to the smart grid. Energy trading…”
Get full text
Journal Article -
10
Wireless Sensor Networks and Multi-UAV systems for natural disaster management
Published in Computer networks (Amsterdam, Netherlands : 1999) (04-09-2017)“…This work identifies the role of Wireless Sensor Networks (WSN) and Unmanned Aerial Vehicles (UAV) in the context of natural disaster management. Main…”
Get full text
Journal Article -
11
5G roadmap: 10 key enabling technologies
Published in Computer networks (Amsterdam, Netherlands : 1999) (04-09-2016)“…The fifth generation (5G) mobile communication networks will require a major paradigm shift to satisfy the increasing demand for higher data rates, lower…”
Get full text
Journal Article -
12
MIMETIC: Mobile encrypted traffic classification using multimodal deep learning
Published in Computer networks (Amsterdam, Netherlands : 1999) (24-12-2019)“…Mobile Traffic Classification (TC) has become nowadays the enabler for valuable profiling information, other than being the workhorse for service…”
Get full text
Journal Article -
13
Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic
Published in Computer networks (Amsterdam, Netherlands : 1999) (26-02-2020)“…The prevention of intrusion is deemed to be a cornerstone of network security. Although excessive work has been introduced on network intrusion detection in…”
Get full text
Journal Article -
14
Cloud-assisted Industrial Internet of Things (IIoT) – Enabled framework for health monitoring
Published in Computer networks (Amsterdam, Netherlands : 1999) (04-06-2016)“…The promising potential of the emerging Internet of Things (IoT) technologies for interconnected medical devices and sensors has played an important role in…”
Get full text
Journal Article -
15
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
Published in Computer networks (Amsterdam, Netherlands : 1999) (24-12-2017)“…Wireless body area networks (WBANs) are used to collect and exchange vital and sensitive information about the physical conditions of patients. Due to the…”
Get full text
Journal Article -
16
Personalized federated learning framework for network traffic anomaly detection
Published in Computer networks (Amsterdam, Netherlands : 1999) (22-05-2022)“…With the widespread use of real-time sensors in various fields, such as IoT systems, it is important to improve the performance of most network traffic anomaly…”
Get full text
Journal Article -
17
Topology optimization against cascading failures on wireless sensor networks using a memetic algorithm
Published in Computer networks (Amsterdam, Netherlands : 1999) (04-08-2020)“…Existing research on cascading failures of wireless sensor networks (WSNs) fails to take into account the role of the sink node on network load distribution,…”
Get full text
Journal Article -
18
A survey on security and privacy issues of UAVs
Published in Computer networks (Amsterdam, Netherlands : 1999) (01-04-2023)“…In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs), has witnessed a rapid increase with its large number of airspace…”
Get full text
Journal Article -
19
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
Published in Computer networks (Amsterdam, Netherlands : 1999) (04-08-2020)“…The widespread use of mobile devices, sensors, and wireless sensor networks and the progressive development of the Internet of Things (IoT) has motivated…”
Get full text
Journal Article -
20
Intrusion detection systems in the Internet of things: A comprehensive investigation
Published in Computer networks (Amsterdam, Netherlands : 1999) (04-09-2019)“…Recently, a new dimension of intelligent objects has been provided by reducing the power consumption of electrical appliances. Daily physical objects have been…”
Get full text
Journal Article