Application layer security for internet communications: A comprehensive review, challenges, and future trends
The security of Internet communications has traditionally been delegated to controls at lower
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …
New approach of multi-path reliable transmission for marginal wireless sensor network
D Zhang, H Wu, P Zhao, X Liu, Y Cui, L Chen… - Wireless …, 2020 - Springer
In the application environment having dense distribution of marginal wireless sensor
network (WSN), the data transmission process will generate a large number of conflicts …
network (WSN), the data transmission process will generate a large number of conflicts …
[HTML][HTML] A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning
As connected and autonomous vehicles proliferate, the Controller Area Network (CAN) bus
has become the predominant communication standard for in-vehicle networks due to its …
has become the predominant communication standard for in-vehicle networks due to its …
Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing
With the continuing growth in various research domains such as Artificial Intelligence (AI),
Machine Learning (ML), Big Data Analytics (BDA), and Cloud Computing (CC), the Internet …
Machine Learning (ML), Big Data Analytics (BDA), and Cloud Computing (CC), the Internet …
Distributed enhanced multi-objective evolutionary algorithm based on decomposition for cluster analysis in wireless sensor network
Conventional clustering algorithms do not recognize patterns and structures with
contradicting objectives in large, distributed datasets. Distributed clustering leverages rapid …
contradicting objectives in large, distributed datasets. Distributed clustering leverages rapid …
Enhancing anomaly detection: a comprehensive approach with MTBO feature selection and TVETBOOptimized Quad-LSTM classification
The rapid growth of computer networks has heightened system vulnerabilities, challenging
traditional Machine Learning (ML) techniques in network anomaly detection due to the …
traditional Machine Learning (ML) techniques in network anomaly detection due to the …
[HTML][HTML] Artificial Intelligence, Internet of things and 6G methodologies in the context of Vehicular Ad-hoc Networks (VANETs): Survey
Recent developments in the fields of communications, smart transportation systems and
computer systems have significantly expanded the potential for intelligent solutions in the …
computer systems have significantly expanded the potential for intelligent solutions in the …
An improved underwater wireless sensor network communication using Internet of Things and signal to noise ratio analysis
Underwater acoustic (UWA) channels are widely regarded as one of the most challenging
communication mediums. Low frequencies are best for acoustic propagation, and the …
communication mediums. Low frequencies are best for acoustic propagation, and the …
Analyzing the impact of active attack on the performance of the AMCTD protocol in underwater wireless sensor networks
The exponentially growing concern of cyber-attacks on extremely dense underwater sensor
networks (UWSNs) and the evolution of UWSNs digital threat landscape has brought novel …
networks (UWSNs) and the evolution of UWSNs digital threat landscape has brought novel …
[HTML][HTML] CIBORG: CIrcuit-Based and ORiented Graph theory permutation routing protocol for single-hop IoT networks
Abstract The Internet of Things (IoT) has emerged as a promising paradigm which facilitates
the seamless integration of physical devices and digital systems, thereby transforming …
the seamless integration of physical devices and digital systems, thereby transforming …