A review of intrusion detection systems in RPL routing protocol based on machine learning for internet of things applications
IPv6 routing protocol for low‐power and lossy networks (RPL) has been developed as a
routing agent in low‐power and lossy networks (LLN), where nodes' resource constraint …
routing agent in low‐power and lossy networks (LLN), where nodes' resource constraint …
ML‐DDoSnet: IoT intrusion detection based on denial‐of‐service attacks using machine learning methods and NSL‐KDD
The Internet of Things (IoT) is a complicated security feature in which datagrams are
protected by integrity, confidentiality, and authentication services. The network is protected …
protected by integrity, confidentiality, and authentication services. The network is protected …
An analysis of strategies for adopting blockchain technology in the after-sales service supply chain
In this paper, we explore strategies for implementing blockchain technology in a supply
chain where a manufacturer outsources base warranty (BW) repairs to a retailer and the …
chain where a manufacturer outsources base warranty (BW) repairs to a retailer and the …
Machine learning methods for intrusive detection of wormhole attack in mobile ad hoc network (MANET)
A wormhole attack is a type of attack on the network layer that reflects routing protocols. The
classification is performed with several methods of machine learning consisting of K‐nearest …
classification is performed with several methods of machine learning consisting of K‐nearest …
A Novel Highway Routing Protocol in Vehicular Ad Hoc Networks Using VMaSC‐LTE and DBA‐MAC Protocols
The vehicular ad hoc networks (VANETs) are an example of mobile networks, which utilizes
dedicated short‐range communication (DSRC) to establish a wireless connection between …
dedicated short‐range communication (DSRC) to establish a wireless connection between …
Development of smart camera systems based on artificial intelligence network for social distance detection to fight against COVID-19
O Karaman, A Alhudhaif, K Polat - Applied Soft Computing, 2021 - Elsevier
In this work, an artificial intelligence network-based smart camera system prototype, which
tracks social distance using a bird's-eye perspective, has been developed.“MobileNet SSD …
tracks social distance using a bird's-eye perspective, has been developed.“MobileNet SSD …
Assessment and prioritize risk factors of financial measurement of management control system for production companies using a hybrid Z-SWARA and Z-WASPAS …
The management control system in an industry is managerial, directional, hindrance, and
cohesive action in order to cohere and regulate various branches and sub-branches. In fact …
cohesive action in order to cohere and regulate various branches and sub-branches. In fact …
Model optimization analysis of customer churn prediction using machine learning algorithms with focus on feature reductions
Currently, Customers are struggling to retain their business in today's competitive markets.
Thus, the issue of customer churn becomes a significant challenge for the industries. In …
Thus, the issue of customer churn becomes a significant challenge for the industries. In …
Metapath and syntax-aware heterogeneous subgraph neural networks for spam review detection
Z Zhang, Y Dong, H Wu, H Song, S Deng… - Applied Soft Computing, 2022 - Elsevier
Abstract Spam Review Detection is a subclass of text classification that aims to distinguish
genuine reviews from spam reviews (eg, irrelevant reviews, deceptive reviews, machine …
genuine reviews from spam reviews (eg, irrelevant reviews, deceptive reviews, machine …
Data Analysis of Decision Support for Sustainable Welfare in The Presence of GDP Threshold Effects: A Case Study of Interactive Data Exploration
Energy usage and GDP have been the subject of numerous studies over the past decades. It
has been overlooked by previous studies that energy consumption correlates with economic …
has been overlooked by previous studies that energy consumption correlates with economic …