Digital technologies as enablers of supply chain sustainability in an emerging economy

M Akbari, JL Hopkins - Operations Management Research, 2022 - Springer
Vietnam is a country with significant potential for growth as a global centre for
manufacturing, as supply chains look to reduce their over-reliance on China in the aftermath …

Blockchain for securing aerial communications: Potentials, solutions, and research directions

RL Kumar, QV Pham, F Khan, MJ Piran, K Dev - Physical Communication, 2021 - Elsevier
Most natural disasters are consequences of hurricanes, floods, volcano eruptions, and
earthquakes, and can severely disturb traditional communications networks and interrupt …

Industrial laser welding defect detection and image defect recognition based on deep learning model developed

H Deng, Y Cheng, Y Feng, J **ang - Symmetry, 2021 - mdpi.com
Aiming at the problem of the poor robustness of existing methods to deal with diverse
industrial weld image data, we collected a series of asymmetric laser weld images in the …

A universal methodology for reliable predicting the non-steroidal anti-inflammatory drug solubility in supercritical carbon dioxide

T Rezaei, V Nazarpour, N Shahini, S Bahmani… - Scientific Reports, 2022 - nature.com
Understanding the drug solubility behavior is likely the first essential requirement for
designing the supercritical technology for pharmaceutical processing. Therefore, this study …

[HTML][HTML] Matrix Profile data mining for BGP anomaly detection

BA Scott, MN Johnstone, P Szewczyk, S Richardson - Computer Networks, 2024 - Elsevier
Abstract The Border Gateway Protocol (BGP), acting as the communication protocol that
binds the Internet, remains vulnerable despite Internet security advancements. This is not …

ISP self-operated BGP anomaly detection based on weakly supervised learning

Y Dong, Q Li, RO Sinnott, Y Jiang… - 2021 IEEE 29th …, 2021 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is arguably the most important and irreplaceable
protocol in the network. However, the lack of routing authentication and validation makes it …

Multi-label classification for AIS data anomaly detection using wavelet transform

M Szarmach, I Czarnowski - IEEE Access, 2022 - ieeexplore.ieee.org
Thanks to the Automatic Identification System (AIS), ships and other maritime equipment are
able to communicate with each other, for example, by sending information about their …

Internet routing anomaly detection using LSTM based autoencoder

AH Muosa, AH Ali - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
The internet is formed by thousands of interconnected Autonomous Systems (ASes). The
Border Gateway Protocol (BGP) exchanges routing information between autonomous …

Learning to Identify Conflicts in RPKI

H Schulmann, S Zhao - arxiv preprint arxiv:2502.03378, 2025 - arxiv.org
The long history of misconfigurations and errors in RPKI indicates that they cannot be easily
avoided and will most probably persist also in the future. These errors create conflicts …

Optimal detection of border gateway protocol anomalies with extensive feature set

M Sunita, SV Mallapur - Multimedia Tools and Applications, 2024 - Springer
For effective and secure access of Internet, the Border Gateway Protocol (BGP) has to be
capable to identify and stop odd concurrences in realistic time. Despite the fact that more …