Results 71 to 80 of about 54,472 (238)

CID‐RPL: Clone ID Attack Detection Using Deep Neural Network for RPL‐Based IoT Networks

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This paper addresses the security vulnerability of Clone ID attacks in RPL‐based IoT networks, which threaten network integrity by cloning legitimate node identities. A novel two‐layer deep neural network approach is proposed to detect these attacks based on network traffic patterns, significantly improving detection accuracy, precision, and system ...
Fatima Al‐Quayed   +5 more
wiley   +1 more source

PERFORMANCE ANALYSIS BETWEEN EXPLICIT SCHEDULING AND IMPLICIT SCHEDULING OF PARALLEL ARRAY-BASED DOMAIN DECOMPOSITION USING OPENMP [PDF]

open access: yesJournal of Engineering Science and Technology, 2014
With the continuous revolution of multicore architecture, several parallel programming platforms have been introduced in order to pave the way for fast and efficient development of parallel algorithms.
MOHAMMED FAIZ ABOALMAALY   +3 more
doaj  

Exploring the Potential of AI in Network Slicing for 5G Networks: An Optimisation Framework

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Our approach is to incorporate precise programming of segment routing over IPv6 (SRv6) identifiers, allowing dynamic assignment of SIDs based on predicted slice types, accurately distinguishing up to 40,000 eMBB slices and separating uRLLC and mMTC slices with high proficiency.
Zeina Boufakhreddine   +4 more
wiley   +1 more source

Towards autonomous device protection using behavioural profiling and generative artificial intelligence

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
The article proposes a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and exploiting a large language model to distinguish between benign and malicious behaviour. Abstract Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid ...
Sandeep Gupta, Bruno Crispo
wiley   +1 more source

Analisis Performa File Transport Protocol Pada Perbandingan Metode IPv4 Murni, IPv6 Murni dan Tunneling 6to4 Berbasis Router Mikrotik

open access: yesJurnal Nasional Teknik Elektro, 2014
The use of IPv4 which has more than 30 years led to the capacity of available addresses is running out availability. Currently emerging new generation IP (IPnext generation) is IPv6. Many methods for the implementation of IPv6, one with tunneling.
Siswo Wardoyo   +2 more
doaj   +1 more source

State‐of‐the‐art of cybersecurity in the power system: Simulation, detection, mitigation, and research gaps

open access: yesIET Generation, Transmission &Distribution, Volume 19, Issue 1, January/December 2025.
This paper presents a review of state‐of‐the‐art of cybersecurity in the power system, reviewing available simulation tools for studying the cybersecurity of the power system, classifying vulnerable components of the power system to cyberattacks, and summarizing the adverse effects of a successful cyberattack on each component in the power system ...
Milad Beikbabaei   +2 more
wiley   +1 more source

Konsep Tingkat Kematangan penerapan Internet Protokol versi 6 (Capability Maturity Model for IPv6 Implementation)

open access: yesBuletin Pos dan Telekomunikasi: Media Komunikasi Ilmiah, 2015
Internet Protocol atau IP merupakan standar penomoran internet di dunia yang jumlahnya terbatas. Di dunia, alokasi IP diatur oleh Internet Assignd Number Authority (IANA) dan didelegasikan ke melalui otoritas masing-masing benua.
Riza Azmi
doaj   +1 more source

Description and Experience of the Clinical Testbeds [PDF]

open access: yes, 2002
This deliverable describes the up-to-date technical environment at three clinical testbed demonstrator sites of the 6WINIT Project, including the adapted clinical applications, project components and network transition technologies in use at these ...
Kalra, D., Lawrentowski, A.
core  

Research on Wireless Sensor Adaptive Networking for Power Monitoring Based on Ultra Wide Band

open access: yesIET Generation, Transmission &Distribution, Volume 19, Issue 1, January/December 2025.
A new network architecture is proposed to address the issue of limited sensor energy and computing power, which utilizes routing nodes to collect sensor data and network the routing nodes. However, the current mature wireless communication technology and networking protocols cannot meet the high reliability and flexibility transmission requirements of ...
Kaiyun Wen, Hongshan Zhao, Shice Zhao
wiley   +1 more source

IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

open access: yesSensors, 2013
Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability
Peter Kirstein   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy