Results 51 to 60 of about 37,323 (253)

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

IPv6 over LPWANs: Connecting Low Power Wide Area Networks to the Internet (of Things)

open access: yesIEEE wireless communications, 2020
LPWANs have recently emerged as a promising solution for enabling industrial IoT applications. To fully exploit their potential, LPWANs need to be connected to the Internet.
Carles Gomez   +4 more
semanticscholar   +1 more source

Internet of Things (IoT) and the Environmental Sustainability: A Literature Review and Recommendations for Future Research

open access: yesCorporate Social Responsibility and Environmental Management, Volume 32, Issue 6, Page 7648-7670, November 2025.
ABSTRACT As the Internet of Things (IoT) surges forward, intersecting with an urgent demand for environmental sustainability (ES), digital technologies emerge as potent orchestrators of systemic transformation. Employing a subtle blend of bibliometric‐systematic literature review (B‐SLR) and qualitative insights, this research investigates IoT's ...
Giuseppe Lanfranchi   +2 more
wiley   +1 more source

Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks

open access: yesIEEE Access, 2020
Vehicle Ad hoc Networks (VANETs) are an emergent wireless communication technology that has the potential to reduce the risk of accidents caused by drivers and provide a wide range of entertainment facilities. Because of the nature of VANETs' open-access
Mahmood A. Al-Shareeda   +4 more
doaj   +1 more source

Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis

open access: yesApplied Sciences, 2023
Software-defined networking (SDN) is a unique network architecture isolating the network control plane from the data plane, offering programmable elastic features that allow network operators to monitor their networks and efficiently manage them. However,
Mohammad Adnan Aladaileh   +6 more
doaj   +1 more source

MobStream: A Reinforcement‐Driven Mobile Streaming Methodology Over Multipath QUIC

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 36, Issue 10, October 2025.
To address the issue of reduced performance caused by the differences in path quality between WiFi and cellular networks, MobStream incorporates partial reliability and a layered coding scheme, paving the way to adapting to varied network conditions without harming the bandwidth utilization.
Yan Cui   +4 more
wiley   +1 more source

Enhancing Cardiovascular Disease Analysis in Healthcare Systems With Hybrid Random Forest and Neural Network Algorithm

open access: yesEngineering Reports, Volume 7, Issue 9, September 2025.
Enhancing Cardiovascular Disease Analysis in Healthcare Systems ABSTRACT Cardiovascular diseases (CVDs) remain a critical challenge in healthcare, requiring advanced analytical solutions for improved diagnosis and risk management. This study proposes a hybrid machine learning framework combining Random Forest (RF) and Neural Network (NN) algorithms to ...
M. Chandraman   +10 more
wiley   +1 more source

Evaluating Multi‐Label Machine Learning Models for Smart Home Environments

open access: yesSoftware: Practice and Experience, Volume 55, Issue 9, Page 1427-1444, September 2025.
ABSTRACT Context Smart home devices have become increasingly popular in modern households, powered by the Internet of Things (IoT) advances. The data generated by smart devices can provide valuable insights into users' behavior and preferences. By analyzing the data, one can understand how people interact with their homes, thus creating a “smart home ...
Diego Corrêa da Silva   +10 more
wiley   +1 more source

ECIS: Energy‐Computing Integrated System

open access: yesEnergy Internet, Volume 2, Issue 2, Page 115-125, July 2025.
ABSTRACT With the growing demand for deep integration between computing power networks (CPNs) and energy systems (ESs), effective collaboration between these systems has become increasingly crucial. To facilitate such integration, this paper proposes an energy‐computing integrated system (ECIS), which consists of a four‐layer framework including a ...
Haoming Zhang   +5 more
wiley   +1 more source

TSCH‐over‐LoRA: long range and reliable IPv6 multi‐hop networks for the internet of things

open access: yesInternet Technology Letters, 2020
TSCH‐over‐LoRa is a long range and reliable IPv6 multi‐hop solution that aims at combining the reliability of TSCH (Time‐Slotted, Channel Hopping) together with the long range capabilities of LoRa.
Martin Haubro   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy