Results 1 to 10 of about 46,457 (297)
A distributed SDN-based intrusion detection system for IoT using optimized forests. [PDF]
Along with the expansion of Internet of Things (IoT), the importance of security and intrusion detection in this network also increases, and the need for new and architecture-specific intrusion detection systems (IDS) is felt.
Ke Luo
doaj +4 more sources
A Cooperative Intrusion Detection System for the Internet of Things Using Convolutional Neural Networks and Black Hole Optimization. [PDF]
Li P, Wang H, Tian G, Fan Z.
europepmc +2 more sources
Delay-tolerant networking (DTN) enables communication in disruptive scenarios where issues such as sparse and intermittent connectivity, long and variable delays, high latency, high error rates, or no end-to-end connectivity exist.
Catarina Nabais +2 more
doaj +1 more source
An Integral Cybersecurity Approach Using a Many-Objective Optimization Strategy
Data networks and computing devices have experienced exponential growth. Within a short span of time, they have opened new digital frontiers while also bringing forth new threats.
Omar Salinas +3 more
doaj +1 more source
A UAV-Assisted Stackelberg Game Model for Securing loMT Healthcare Networks
On the one hand, the Internet of Medical Things (IoMT) in healthcare systems has emerged as a promising technology to monitor patients’ health and provide reliable medical services, especially in remote and underserved areas.
Jamshed Ali Shaikh +7 more
doaj +1 more source
Software Defined Networking (SDN) presents a tremendous opportunity for developing abstract management of network updates. However, network updates introduce challenges in terms of consistency. Many consistent update algorithms are proposed for Ethernet,
Jun Lu +4 more
doaj +1 more source
Spectrum sharing security and attacks in CRNs: a review [PDF]
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics.
Alhakami, Wajdi +2 more
core +2 more sources
From Physics Model to Results: An Optimizing Framework for Cross-Architecture Code Generation [PDF]
Starting from a high-level problem description in terms of partial differential equations using abstract tensor notation, the Chemora framework discretizes, optimizes, and generates complete high performance codes for a wide range of compute ...
Blazewicz, Marek +8 more
core +4 more sources
The Impacts of Social Equity on Health
Terry Gerton: Those that are coming behind us have a different level of expectation. They are expecting us to be better and to do better, and they're not going to let us continue the status quo. Welcome to Management Matters, a National Academy of Public
doaj +1 more source
Efficient Algorithms for Distributed Detection of Holes and Boundaries in Wireless Networks [PDF]
We propose two novel algorithms for distributed and location-free boundary recognition in wireless sensor networks. Both approaches enable a node to decide autonomously whether it is a boundary node, based solely on connectivity information of a small ...
Schieferdecker, Dennis +2 more
core +3 more sources

