All Stories

  1. Evaluating Suprasegmental Features for Phonological Fusion and Spectrogram-Based Speech Command Recognition
  2. Comparative Study for Different Machine Learning Model for Parkinson’s Disease Detection
  3. Investigating the performance vs. computational complexity tradeoff in cross-domain fire risk detection
  4. Revocable and Privacy‐Preserving CP‐ABE Scheme for Secure mHealth Data Access in Blockchain
  5. Secure and Efficient Routing in Fog-Enabled VANETs: A Clustering-Based Approach
  6. Exploring the Transformative Impact of Blockchain Technology on Healthcare: Security, Challenges, Benefits, and Future Outlook
  7. A Novel Pyra-Cryptosystem Relying Secure Light-Weight Data Exchange, Peer-to-Peer Authentication, and Secure Communication Session Key Management Approach-Based Model for Internet of Things Network Security
  8. Network Partitioning Problem and UAVs' Integration for Efficient Connectivity Restoration: A Systematic Review
  9. AI vs. AI: Deep Learning Approaches for Detecting Deepfake Content
  10. Enhancing Veracity: Leveraging Machine Learning Ensemble Methods For Fake News Detection
  11. Machine Learning and Deep Learning in Fake News Detection: An In-Depth Review
  12. Multi-Head Self-Attention Mechanism for Enhanced Deepfake Detection
  13. Unveiling The Power Deep Learning Models for Skin Cancer Detection
  14. A Study of the Security and Privacy Risks in Health-Related Mobile Applications in India
  15. Multimodal Integration of Mel Spectrograms and Text Transcripts for Enhanced Automatic Speech Recognition: Leveraging Extractive Transformer‐Based Approaches and Late Fusion Strategies
  16. Dhivehi Speech Recognition: A Multimodal Approach for Dhivehi Language in Resource-Constrained Settings
  17. A Raspberry Pi 4 and Arduino-based Automated Intercom Door Lock System
  18. A Comparative Study of Deep Learning Models for Brain Tumor Classification
  19. Performance analysis of RPL protocol in different nodes positioning using Contiki Cooja
  20. A Comparative Study of Machine Learning Models for Network Traffic Classification in the IoT Landscape
  21. Analyzing Yoga Pose Recognition: A Comparison of MediaPipe and YOLO Keypoint Detection with Ensemble Techniques
  22. Improving Intrusion Detection in a Software Defined Network using Hybrid CNN and Bi-LSTM
  23. Track Consensus-Based Labeled Multi-Target Tracking in Mobile Distributed Sensor Network
  24. Workload dynamics implications in permissioned blockchain scalability and performance
  25. Evaluation of Different Machine Learning Classifiers on New IoT Dataset CICIoT2023
  26. Sensing the Health of a Computer Network through Estimation of its Reliability based on Sensors Response Data Analysis and its Impact on Network Management
  27. A deep learning approach to dysarthric utterance classification with BiLSTM-GRU, speech cue filtering, and log mel spectrograms
  28. Speaker independent recognition of low-resourced multilingual Arabic spoken words through hybrid fusion
  29. BREATH-Net: a novel deep learning framework for NO2 prediction using bi-directional encoder with transformer
  30. Network partition detection and recovery with the integration of unmanned aerial vehicle
  31. Review of Authentication Communication Protocols in Mobile(Vehicular) Network via FOG Computing
  32. Implementation of a mobile application for managing academic life of new college students
  33. An Experimental Study on Estimation of Reliability of a Computer Network for the Network of Delhi Development Authority: A Study on Challenges, Experiment and Its Results, Potential Future Avenues and Significance of Ongoing Research
  34. Combating Respiratory Health Issues with Intelligent NO2 Level Prediction from Sentinel 5P Satellite
  35. A novel approach for forecasting PM2.5 pollution in Delhi using CATALYST
  36. Improving speech command recognition through decision-level fusion of deep filtered speech cues
  37. Artificial intelligence in cerebral stroke images classification and segmentation: A comprehensive study
  38. IQR-based approach for DDoS detection and mitigation in SDN
  39. Mitigation of DDoS Attack Using Moving Target Defense in SDN
  40. Security concerns over IoT routing using emerging technologies: A review
  41. Investigating the Impact of Workload Characteristics on the Scalability and Performance of Permissioned Blockchain
  42. Coordinated network partition detection and bi-connected inter-partition topology creation in damaged sensor networks using multiple UAVs
  43. A Rubik's Cube Cryptosystem based Authentication and Session Key generation model driven in Blockchain environment for IoT Security
  44. Forecasting of Satellite Based Carbon-Monoxide Time-Series Data Using a Deep Learning Approach
  45. Image Processing and Intelligent Computing Systems
  46. Secure IoV-enabled systems at Fog Computing
  47. An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks
  48. UAVs assisted Network Partition Detection and Connectivity Restoration in Wireless Sensor and Actor Networks
  49. Partition detection and recovery by UAVs in damaged WSANs using N‐angle clustering
  50. Pathological Analysis of Blood Cells Using Deep Learning Techniques
  51. Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
  52. EpilNet: A Novel Approach to IoT based Epileptic Seizure Prediction and Diagnosis System using Artificial Intelligence
  53. Detecting DDoS Attacks in Cloud Computing Using Extreme Learning Machine and Adaptive Differential Evolution
  54. Distributed Fault-Tolerant Target Tracking Using Event-Based Communication in Internet of Robotic Things
  55. Distributed denial of service attack detection in cloud computing using hybrid extreme learning machine
  56. DDoS Attacks Detection in Cloud Computing Using ANN and Imperialistic Competitive Algorithm
  57. Optimized extreme learning machine for detecting DDoS attacks in cloud computing
  58. Secure Remote E-Voting using Blockchain
  59. Multi-Robot Coordination Analysis, Taxonomy, Challenges and Future Scope
  60. Critical power analysis for control path of a CAT-M based edge device
  61. Addressing Spoofed DDoS Attacks in Software-defined Networking
  62. Detection and Analysis of TCP-SYN DDoS Attack in Software-Defined Networking
  63. Attack and intrusion detection in cloud computing using an ensemble learning approach
  64. Towards Utilizing Blockchain for Countering Distributed Denial-of-Service (DDoS)
  65. DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN
  66. Distributed Denial of Service Attacks and Defense in Cloud Computing
  67. Comparative Study of Different Reduced Precision Techniques in Deep Neural Network
  68. The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things
  69. Multilayer Perceptron and Genetic Algorithm-Based Intrusion Detection Framework for Cloud Environment
  70. Passive Authentication Image Forgery Detection Using Multilayer CNN
  71. Voting extreme learning machine based distributed denial of service attack detection in cloud computing
  72. Software-defined Networking Based DDoS Defense Mechanisms
  73. Software-defined Networking Based DDoS Defense Mechanisms
  74. Voting based Intrusion Detection Framework for Securing Software-Defined Networks
  75. Voting based Intrusion Detection Framework for Securing Software-Defined Networks
  76. Voting‐based intrusion detection framework for securing software‐defined networks
  77. Automated human mind reading using EEG signals for seizure detection
  78. CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis
  79. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review
  80. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review
  81. Target Tracking with Cooperative Networked Robots
  82. Comment on “DIO Suppression Attack Against Routing in the Internet of Things”
  83. Comment on “DIO Suppression Attack Against Routing in the Internet of Things”
  84. Relay Node Placement Techniques in Wireless Sensor Networks
  85. Relay Node Placement Techniques in Wireless Sensor Networks
  86. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review
  87. Addressing Copycat Attacks in IPv6-Based Low Power and Lossy Networks
  88. Trajectory Tracking Control of Unmanned Aerial Vehicle for Autonomous Applications
  89. MockRest—A Generic Approach for Automated Mock Framework for REST APIs Generation
  90. Syntactic Interoperability in Real-Time Systems, ROS 2, and Adaptive AUTOSAR Using Data Distribution Services: An Approach
  91. DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN
  92. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
  93. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
  94. On evaluation of Network Intrusion Detection Systems: Statistical analysis of CIDDS-001 dataset using Machine Learning Techniques
  95. On evaluation of Network Intrusion Detection Systems: Statistical analysis of CIDDS-001 dataset using Machine Learning Techniques
  96. An Obstacle-resistant Relay Node Placement in Constrained Environment
  97. An Obstacle-resistant Relay Node Placement in Constrained Environment
  98. Comment on “DIO Suppression Attack Against Routing in the Internet of Things”
  99. Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networks
  100. Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks
  101. Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks
  102. Machine Learning Based Intrusion Detection Systems for IoT Applications
  103. Path Planning of Unmanned Aerial Vehicles: Current State and Future Challenges
  104. LETSRP: A Secure Routing Protocol for Manets
  105. Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks
  106. API Features Individualizing of Web Services: REST and SOAP
  107. Performance Analysis of WebRTC and SIP for Video Conferencing
  108. Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT
  109. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
  110. Defending DDoS against Software Defined Networks using Entropy
  111. To Evaluate Performance of Routing Protocols Using Reliable LET in MANETs
  112. Distributed Denial of Service Attacks and Defense in Cloud Computing
  113. Security Challenges in Fog Computing
  114. Hybrid Traceback Scheme for DDoS Attacks
  115. Swarm Intelligence-based Partitioned Recovery in Wireless Sensor Networks
  116. Analysis of Routing Attacks on RPL based 6LoWPAN Networks
  117. A New Centralized Solution for Multi-event Wireless Sensor and Actor Networks
  118. Performance Evaluation of Machine Learning Classifiers on Internet of Things Security Dataset
  119. Whale Optimizer to Repair Partitioned Heterogeneous Wireless Sensor Networks
  120. Parametric Analysis of Heart Attack Prediction Using Machine Learning Techniques
  121. Ant colony based IP traceback scheme
  122. Intelligent Traffic Management System for Prioritizing Emergency Vehicles in a Smart City
  123. Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning
  124. An IoT-VANET-Based Traffic Management System for Emergency Vehicles in a Smart City
  125. Federating Disjoint Segments in Wireless Sensor Networks Using Jumping Particle Swarm Optimization
  126. IP Traceback Schemes for DDoS Attack
  127. Meta-heuristic solution for relay nodes placement in constrained environment
  128. Sentiment analysis of the Uri terror attack using Twitter
  129. Healing Partitioned Wireless Sensor Networks
  130. Particle Swarm Optimization for Disconnected Wireless Sensor Networks
  131. Relay node placement in constrained environment
  132. An Obstacle-Resistant Relay Node Placement in Constrained Environment
  133. Restoration of lost connectivity of partitioned wireless sensor networks
  134. Node Stability Aware Energy Efficient Single Node Failure Recovery Approach for WSANs
  135. A multi-criterion fuzzy logic intra-cluster and inter-cluster-based stable cluster head election approach in large scale WSN
  136. A multi-criterion fuzzy logic intra-cluster and inter-cluster-based stable cluster head election approach in large scale WSN
  137. Meta-heuristics for relay node placement problem in wireless sensor networks
  138. Sensor enabled Internet of Things for smart cities
  139. Lost Connectivity Restoration in Partitioned Wireless Sensor Networks
  140. Relay node placement to heal partitioned wireless sensor networks
  141. Relay node placement techniques in wireless sensor networks
  142. Placement of relay nodes in wireless sensor networks
  143. Modified Max-Min Algorithm for Game Theory
  144. Recovery of Lost Connectivity in Wireless Sensor and Actor Networks using Static Sensors as Bridge Routers
  145. A distributed approach for selection of optimal actor nodes in wireless sensor and actor networks
  146. Network connectivity maintenance of WSNs in node failure-prone environment: A detailed survey
  147. A Hybrid Timer Based Single Node Failure Recovery Approach for WSANs
  148. A Cluster-Based Coordination and Communication Framework Using GA for WSANs
  149. MFZLP: Multihop Far Zone Leach Protocol for WSNs
  150. Network Partitioning Recovery Mechanisms in WSANs: a Survey
  151. Performance Evaluation Of Aodv, Dsr, Dsdv Mobile Ad-Hoc Protocols On Different Scenarios: An Analytical Review