Ausgabe 4/2024
Inhalt (42 Artikel)
Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN
Binthiya A, Selvi Ravindran
An energy efficient Swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoT
R. Shanmugapriya, Santhosh Kumar SVN
Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing
J. Sangeethapriya, Michael Arock, U. Srinivasulu Reddy
A supervised privacy preservation transaction system for aviation business
Xingguang Zhou, Weihan Li, Lin Zhong
ONMCA: One-Network-Multi-Chain Architecture for customizable asset-oriented blockchain systems
Liang Wang, Wenying Zhou, Lina Zuo, Haibo Liu, Wenchi Ying
Energy efficient multi-objective cluster-based routing protocol for WSN using Interval Type-2 Fuzzy Logic modified dingo optimization
S. Kishore Verma, K. Lokeshwaran, J. Martin Sahayaraj, J. S. Adeline Johnsana
Improving byzantine fault tolerance based on stake evaluation and consistent hashing
Guangfu Wu, Xin Lai, Daojing He, Sammy Chan, Xiaoyan Fu
Deep reinforcement learning-based joint optimization model for vehicular task offloading and resource allocation
Zhi-Yuan Li, Zeng-Xiang Zhang
Hybrid Multipath Routing Cluster head prediction based on SDN-enabled IoT and Heterogeneous context-aware graph convolution network
R. Prabha, Senthil G. A, G. P. Bharathi, S. Sridevi
Lower rounds lattice-based anonymous AKA under the seCK model for the IoT
Guanglu Wei, Kai Fan, Kuan Zhang, Haoyang Wang, Yirui Wang, Kan Yang, Hui Li, Yintang Yang
DIEET: Knowledge–Infused Event Tracking in Social Media based on Deep Learning
Jun Ge, Lei-lei Shi, Lu liu, Zi-xuan Han, Anthony Miller
An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques
M. S. Minu, P. Jona Innisai Rani, Vijaya Krishna Sonthi, G. Shankar, E Mohan, A. Rajesh
A comprehensive review on vehicular ad-hoc networks routing protocols for urban and highway scenarios, research gaps and future enhancements
Ishita Seth, Kalpna Guleria, Surya Narayan Panda
Insulator defect detection in complex scenarios based on cascaded networks with lightweight attention mechanism
Yang Ning, Li Xiang, Jing Hongyuan, Shang Xinna, Shen Ping, Chen Aidong
Truthful double auction based incentive mechanism for participatory sensing systems
Asif Iqbal Middya, Sarbani Roy
Smart grid security based on blockchain and smart contract
Ming Zhang, Yutong Liu, Qian Cheng, Hui Li, Dan Liao, Huiyong Li
An intelligent behavioral-based DDOS attack detection method using adaptive time intervals
Ali Shamekhi, Pirooz Shamsinejad Babaki, Reza Javidan
An optimal secure and reliable certificateless proxy signature for industrial internet of things
Rafiq Ullah, Amjad Mehmood, Muhammad Altaf Khan, Carsten Maple, Jaime Lloret
Taas: Trust assessment as a service for secure communication of green edge-assisted UAV network
Qixu Wang, Peng Xiao, Xiang Li, Yunxiang Qiu, Tao Zheng, Zhiguang Qin
Enhancing cybersecurity in IoT networks: SLSTM-WCO algorithm for anomaly detection
Tripti Sharma, Sanjeev Kumar Prasad
Service based VEINS framework for vehicular Ad-hoc network (VANET): A systematic review of state-of-the-art
Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Abeer Abdullah Alsadhan, Zeyad Ghaleb Al-Mekhlafi, Amer A. Sallam, Bassam Ali Al-Qatab, Mohammad T. Alshammari, Abdulaziz M. Alayba
Enhancing IoT security in MANETs: A novel adaptive defense reinforcement approach
S. Saravanan, V. Surya, V. Valarmathi, E. Nalina
BACASE-SH: Blockchain-based authenticated certificate-less asymmetric searchable encryption for smart healthcare
Arian Arabnouri, Alireza Shafieinejad
IDA: Improved dragonfly algorithm for load balanced cluster heads selection in wireless sensor networks
Ankita Srivastava, Pramod Kumar Mishra
H-Louvain: Hierarchical Louvain-based community detection in social media data streams
Zi-xuan Han, Lei-lei Shi, Lu Liu, Liang Jiang, Wan Tang, Xiao Chen, Jing-yu Yang, Ayodeji O. Ayorinde, Nick Antonopoulos
Assessing the efficacy of a novel adaptive fuzzy c-means (AFCM) based clustering algorithm for mobile agent itinerary planning in wireless sensor networks using validity indices
Nidhi Kashyap, Shuchita Upadhyaya, Monika Poriye, Sachin Lalar, Shalini Aggarwal
Improving NB-IoT performance in weak coverage areas with CBSTO polar coding and LMMSE channel estimation
G Bavani, V. Prasanna Srinivasan, K. Balasubadra, Velankanni Cyril Raj
Authenticated key agreement for IoT network using HECC and CRT four co-primes
Chandan Goswami, Avishek Adhikari, Suraj Kumar Sahoo, Pinaki Sarkar
Improved blockchain-based user authentication protocol with ring signature for internet of medical things
J. Chandra Priya, R. Praveen, K. Nivitha, T. Sudhakar
DDPG-based optimal task placement strategy for computation offloading in green mobile edge networks
Kun Lu, Guorui Xu, Runfa Zhang, Mingchu Li, Rongda Li
Dynamic behavioral profiling for anomaly detection in software-defined IoT networks: A machine learning approach
Senthilraja P, Kanmani Palaniappan, Brindha Duraipandi, Uma Maheswari Balasubramanian
An effective trajectory planning heuristics for UAV-assisted vessel monitoring system
Jie Zhu, Kaiyu Guo, Pengfei He, Haiping Huang, Reza Malekian, Yuzhong Sun
A privacy protection scheme for green communication combining digital steganography
Pengbiao Zhao, Bintao Wang, Zhen Qin, Yi Ding, Kim-Kwang Raymond Choo
Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks
Xiaoyu Kou, Fengwei Wang, Hui Zhu, Yandong Zheng, Xiaopeng Yang, Zhe Liu
A peer-to-peer energy trading model for community microgrids with energy management
K. Ravivarma, B. Lokeshgupta
A lightweight and anonymous mutual authentication and key agreement scheme for WBAN
Saba Marandi, Farokhlagha Moazami, Amir Malekinezhad
Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs)
Pradeep Radhakrishnan, Praveen Kumar Sugumar, Preethi Ponnan, Gopirajan Punniyakotti Varadharajan
Invisible man: blockchain-enabled peer-to-peer collaborative privacy games in LBSs
Beining Zhang, Hang Shen, Tianjing Wang, Guangwei Bai