A review of intrusion detection systems in RPL routing protocol based on machine learning for internet of things applications

A Seyfollahi, A Ghaffari - Wireless Communications and Mobile …, 2021 - Wiley Online Library
IPv6 routing protocol for low‐power and lossy networks (RPL) has been developed as a
routing agent in low‐power and lossy networks (LLN), where nodes' resource constraint …

ML‐DDoSnet: IoT intrusion detection based on denial‐of‐service attacks using machine learning methods and NSL‐KDD

M Esmaeili, SH Goki, BHK Masjidi… - Wireless …, 2022 - Wiley Online Library
The Internet of Things (IoT) is a complicated security feature in which datagrams are
protected by integrity, confidentiality, and authentication services. The network is protected …

An analysis of strategies for adopting blockchain technology in the after-sales service supply chain

A Ullah, M Ayat, Y He, B Lev - Computers & Industrial Engineering, 2023 - Elsevier
In this paper, we explore strategies for implementing blockchain technology in a supply
chain where a manufacturer outsources base warranty (BW) repairs to a retailer and the …

Machine learning methods for intrusive detection of wormhole attack in mobile ad hoc network (MANET)

M Abdan, SAH Seno - Wireless Communications and Mobile …, 2022 - Wiley Online Library
A wormhole attack is a type of attack on the network layer that reflects routing protocols. The
classification is performed with several methods of machine learning consisting of K‐nearest …

A Novel Highway Routing Protocol in Vehicular Ad Hoc Networks Using VMaSC‐LTE and DBA‐MAC Protocols

E Khezri, E Zeinali, H Sargolzaey - … communications and mobile …, 2022 - Wiley Online Library
The vehicular ad hoc networks (VANETs) are an example of mobile networks, which utilizes
dedicated short‐range communication (DSRC) to establish a wireless connection between …

Development of smart camera systems based on artificial intelligence network for social distance detection to fight against COVID-19

O Karaman, A Alhudhaif, K Polat - Applied Soft Computing, 2021 - Elsevier
In this work, an artificial intelligence network-based smart camera system prototype, which
tracks social distance using a bird's-eye perspective, has been developed.“MobileNet SSD …

Assessment and prioritize risk factors of financial measurement of management control system for production companies using a hybrid Z-SWARA and Z-WASPAS …

S Rahmati, MH Mahdavi, SJ Ghoushchi, H Tomaskova… - Mathematics, 2022 - mdpi.com
The management control system in an industry is managerial, directional, hindrance, and
cohesive action in order to cohere and regulate various branches and sub-branches. In fact …

Model optimization analysis of customer churn prediction using machine learning algorithms with focus on feature reductions

SM Sina Mirabdolbaghi, B Amiri - Discrete Dynamics in Nature …, 2022 - Wiley Online Library
Currently, Customers are struggling to retain their business in today's competitive markets.
Thus, the issue of customer churn becomes a significant challenge for the industries. In …

Metapath and syntax-aware heterogeneous subgraph neural networks for spam review detection

Z Zhang, Y Dong, H Wu, H Song, S Deng… - Applied Soft Computing, 2022 - Elsevier
Abstract Spam Review Detection is a subclass of text classification that aims to distinguish
genuine reviews from spam reviews (eg, irrelevant reviews, deceptive reviews, machine …

Data Analysis of Decision Support for Sustainable Welfare in The Presence of GDP Threshold Effects: A Case Study of Interactive Data Exploration

F Asgari, SGA Ghoreishi, M Khajavi, A Foozoni… - arxiv preprint arxiv …, 2024 - arxiv.org
Energy usage and GDP have been the subject of numerous studies over the past decades. It
has been overlooked by previous studies that energy consumption correlates with economic …