Results 1 to 10 of about 401,857 (131)

A distributed SDN-based intrusion detection system for IoT using optimized forests [PDF]

open access: yesPLoS ONE, 2023
Along with the expansion of Internet of Things (IoT), the importance of security and intrusion detection in this network also increases, and the need for new and architecture-specific intrusion detection systems (IDS) is felt.
Ke Luo
doaj   +4 more sources

BiRep: A Reputation Scheme to Mitigate the Effects of Black-Hole Nodes in Delay-Tolerant Internet of Vehicles

open access: yesSensors, 2021
Delay-tolerant networking (DTN) enables communication in disruptive scenarios where issues such as sparse and intermittent connectivity, long and variable delays, high latency, high error rates, or no end-to-end connectivity exist.
Catarina Nabais   +2 more
doaj   +1 more source

An Integral Cybersecurity Approach Using a Many-Objective Optimization Strategy

open access: yesIEEE Access, 2023
Data networks and computing devices have experienced exponential growth. Within a short span of time, they have opened new digital frontiers while also bringing forth new threats.
Omar Salinas   +3 more
doaj   +1 more source

A UAV-Assisted Stackelberg Game Model for Securing loMT Healthcare Networks

open access: yesDrones, 2023
On the one hand, the Internet of Medical Things (IoMT) in healthcare systems has emerged as a promising technology to monitor patients’ health and provide reliable medical services, especially in remote and underserved areas.
Jamshed Ali Shaikh   +7 more
doaj   +1 more source

A Mixed-Critical Consistent Update Algorithm in Software Defined Time-Triggered Ethernet Using Time Window

open access: yesIEEE Access, 2020
Software Defined Networking (SDN) presents a tremendous opportunity for developing abstract management of network updates. However, network updates introduce challenges in terms of consistency. Many consistent update algorithms are proposed for Ethernet,
Jun Lu   +4 more
doaj   +1 more source

The Impacts of Social Equity on Health

open access: yesHealth Equity, 2021
Terry Gerton: Those that are coming behind us have a different level of expectation. They are expecting us to be better and to do better, and they're not going to let us continue the status quo. Welcome to Management Matters, a National Academy of Public
doaj   +1 more source

Optimization of Consignment-Store-Based Supply Chain with Black Hole Algorithm

open access: yesComplexity, 2017
The globalization of economy and market led to increased networking in the field of manufacturing and services. These manufacturing and service processes including supply chain became more and more complex.
Ágota Bányai   +2 more
doaj   +1 more source

Enhanced Network Metric Prediction for Machine Learning-Based Cyber Security of a Software-Defined UAV Relay Network

open access: yesIEEE Access
Unmanned aerial vehicles (UAVs), e.g., drones, have become crucial assets in the military’s fleet of vehicles. UAVs can provide limited bandwidth for tactical communications and can act as relays over battlefields.
Dennis Agnew   +2 more
doaj   +1 more source

The evaluation of luminance in a road tunnel based on CIE88-2004 standard to reduce road accidents

open access: yesSalāmat-i kār-i Īrān, 2020
Background and aims: Traffic safety is a major concern all around the world. About 1.5 million people die each year from road accidents and 50 million are injured.
Ahmad Mehri   +7 more
doaj  

Predicting the properties of black holes merger remnants with Deep Neural Networks [PDF]

open access: greenClass.Quant.Grav. 37 (2020) 13, 135005, 2019
We present the first estimation of the mass and spin magnitude of Kerr black holes resulting from the coalescence of binary black holes using a deep neural network. The network is trained on a dataset containing 80\% of the full publicly available catalog of numerical simulations of gravitational waves emission by binary black hole systems, including ...
L. Haegel, S. Husa
arxiv   +3 more sources

Home - About - Disclaimer - Privacy