Machine learning methods for intrusive detection of wormhole attack in mobile ad hoc network (MANET)
A wormhole attack is a type of attack on the network layer that reflects routing protocols. The
classification is performed with several methods of machine learning consisting of K‐nearest …
classification is performed with several methods of machine learning consisting of K‐nearest …
A survey on node localization technologies in UWSNs: Potential solutions, recent advancements, and future directions
Location‐based underwater communication applications such as strategic surveillance,
disaster prevention, marine research, and mine detection have given the field of underwater …
disaster prevention, marine research, and mine detection have given the field of underwater …
Wireless network upgraded with artificial intelligence on the data aggregation towards the smart internet applications
In the modern evolution, WSN (Wireless Sensor Network) incorporated with data
aggregation platform which involves stimulating research area with various modern …
aggregation platform which involves stimulating research area with various modern …
A survey on security threats and network vulnerabilities in Internet of Things
HK Saini, M Poriye, N Goyal - Big Data Analytics in Intelligent IoT and …, 2023 - Springer
Abstract Internet of Things (IoT) is a group of physical objects like sensors and actuators etc.
connected through the network for dynamic exchange of information for augmenting the …
connected through the network for dynamic exchange of information for augmenting the …
Emerging Data Aggregation State-of-Art Techniques with Comparative Analysis in UWSN
AM Pandith, N Goyal - 2022 2nd International Conference on …, 2022 - ieeexplore.ieee.org
Underwater Wireless Sensor Networks (UWSNs) carry out collaborative monitoring and data
gathering activities utilizing components like sensors and vehicles placed in a defined …
gathering activities utilizing components like sensors and vehicles placed in a defined …
iWindCr field trial and electrochemical analysis for corrosion detection and monitoring offshore wind turbine's MP-TP steel components
S Simandjuntak, N Bausch, A Farrar… - Journal of Marine …, 2022 - Taylor & Francis
ABSTRACT A Proof-of-Concept (POC) low power-low current wireless sensor network
(WSN) for corrosion detection and monitoring of offshore wind turbine (OWT)'s component …
(WSN) for corrosion detection and monitoring of offshore wind turbine (OWT)'s component …
Sliding mode control for nonlinear semi-Markov jump systems with cyber attacks via fuzzy logic
P Yu, F **g, J Guo - Journal of Intelligent & Fuzzy Systems, 2024 - content.iospress.com
This paper studies the security control problem of semi-Markov jump systems. First, the
parameter uncertainty, the time-varying delay, the nonlinear function and the cyber attack …
parameter uncertainty, the time-varying delay, the nonlinear function and the cyber attack …
E-learning with Internet of Things: Architecture and Its Applications
In the networking area, developments in technical e-learning can be referred to as the
Internet of Things (IoT). It is shown that it is now better to be associated with real-world affairs …
Internet of Things (IoT). It is shown that it is now better to be associated with real-world affairs …
14 E-learning with
The Internet of Things (IoT) is a common infrastructure that offers physical and virtual objects
for connectivity and collaboration. It increases in size and dimension as it progresses …
for connectivity and collaboration. It increases in size and dimension as it progresses …
Internet of Underwater Things: Applications and Challenges
S Jain, N Yadav, M Husain, M Aggarwal, P Arya… - Internet of …, 2022 - taylorfrancis.com
The Internet of Underwater Things (IoUT) can be termed as a novel class of Internet of
Things (IoT), which is characterized as the organization of an intricate network of submerged …
Things (IoT), which is characterized as the organization of an intricate network of submerged …