Results 1 to 10 of about 232,693 (246)
A distributed SDN-based intrusion detection system for IoT using optimized forests. [PDF]
Along with the expansion of Internet of Things (IoT), the importance of security and intrusion detection in this network also increases, and the need for new and architecture-specific intrusion detection systems (IDS) is felt.
Ke Luo
doaj +4 more sources
Optimization of Consignment-Store-Based Supply Chain with Black Hole Algorithm
The globalization of economy and market led to increased networking in the field of manufacturing and services. These manufacturing and service processes including supply chain became more and more complex.
Ágota Bányai+2 more
doaj +2 more sources
A Cooperative Intrusion Detection System for the Internet of Things Using Convolutional Neural Networks and Black Hole Optimization. [PDF]
Li P, Wang H, Tian G, Fan Z.
europepmc +2 more sources
Delay-tolerant networking (DTN) enables communication in disruptive scenarios where issues such as sparse and intermittent connectivity, long and variable delays, high latency, high error rates, or no end-to-end connectivity exist.
Catarina Nabais+2 more
doaj +1 more source
An Integral Cybersecurity Approach Using a Many-Objective Optimization Strategy
Data networks and computing devices have experienced exponential growth. Within a short span of time, they have opened new digital frontiers while also bringing forth new threats.
Omar Salinas+3 more
doaj +1 more source
A UAV-Assisted Stackelberg Game Model for Securing loMT Healthcare Networks
On the one hand, the Internet of Medical Things (IoMT) in healthcare systems has emerged as a promising technology to monitor patients’ health and provide reliable medical services, especially in remote and underserved areas.
Jamshed Ali Shaikh+7 more
doaj +1 more source
Software Defined Networking (SDN) presents a tremendous opportunity for developing abstract management of network updates. However, network updates introduce challenges in terms of consistency. Many consistent update algorithms are proposed for Ethernet,
Jun Lu+4 more
doaj +1 more source
Spectrum sharing security and attacks in CRNs: a review [PDF]
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics.
Alhakami, Wajdi+2 more
core +2 more sources
From Physics Model to Results: An Optimizing Framework for Cross-Architecture Code Generation [PDF]
Starting from a high-level problem description in terms of partial differential equations using abstract tensor notation, the Chemora framework discretizes, optimizes, and generates complete high performance codes for a wide range of compute ...
Blazewicz, Marek+8 more
core +4 more sources
The Impacts of Social Equity on Health
Terry Gerton: Those that are coming behind us have a different level of expectation. They are expecting us to be better and to do better, and they're not going to let us continue the status quo. Welcome to Management Matters, a National Academy of Public
doaj +1 more source