All Stories

  1. ABHealChain: Enhancing Privacy and Security in Healthcare Data Sharing Through Hyperledger Fabric and Attribute‐Based Access Control
  2. PhonoBiEmbedNet: A Phoneme and Bigram Embedding Framework for Low-Resource Spoken Word Recognition
  3. Mitigation and Performance Analysis of Internal Routing Attacks in RPL-Based IoT Networks under Different Node Deployments
  4. A Decentralized Traffic Light Scheduling Algorithm for Intelligent Transportation Systems
  5. IGNITE-NET: fire risk prediction using dynamic receptive fields and dynamic channel fusion attention
  6. A Comparative Analysis of Machine Learning Techniques in Traffic Signal Control Systems
  7. Fault Tolerant Decentralized Cooperative Target Tracking Using Event-Based Communications
  8. Evaluating Suprasegmental Features for Phonological Fusion and Spectrogram-Based Speech Command Recognition
  9. Comparative Study for Different Machine Learning Model for Parkinson’s Disease Detection
  10. Investigating the performance vs. computational complexity tradeoff in cross-domain fire risk detection
  11. Revocable and Privacy‐Preserving CP‐ABE Scheme for Secure mHealth Data Access in Blockchain
  12. Secure and Efficient Routing in Fog-Enabled VANETs: A Clustering-Based Approach
  13. Exploring the Transformative Impact of Blockchain Technology on Healthcare: Security, Challenges, Benefits, and Future Outlook
  14. A Novel Pyra-Cryptosystem Relying Secure Light-Weight Data Exchange, Peer-to-Peer Authentication, and Secure Communication Session Key Management Approach-Based Model for Internet of Things Network Security
  15. Network Partitioning Problem and UAVs' Integration for Efficient Connectivity Restoration: A Systematic Review
  16. AI vs. AI: Deep Learning Approaches for Detecting Deepfake Content
  17. Enhancing Veracity: Leveraging Machine Learning Ensemble Methods For Fake News Detection
  18. Machine Learning and Deep Learning in Fake News Detection: An In-Depth Review
  19. Multi-Head Self-Attention Mechanism for Enhanced Deepfake Detection
  20. Unveiling The Power Deep Learning Models for Skin Cancer Detection
  21. A Study of the Security and Privacy Risks in Health-Related Mobile Applications in India
  22. Multimodal Integration of Mel Spectrograms and Text Transcripts for Enhanced Automatic Speech Recognition: Leveraging Extractive Transformer‐Based Approaches and Late Fusion Strategies
  23. Dhivehi Speech Recognition: A Multimodal Approach for Dhivehi Language in Resource-Constrained Settings
  24. A Raspberry Pi 4 and Arduino-based Automated Intercom Door Lock System
  25. A Comparative Study of Deep Learning Models for Brain Tumor Classification
  26. Performance analysis of RPL protocol in different nodes positioning using Contiki Cooja
  27. A Comparative Study of Machine Learning Models for Network Traffic Classification in the IoT Landscape
  28. Analyzing Yoga Pose Recognition: A Comparison of MediaPipe and YOLO Keypoint Detection with Ensemble Techniques
  29. Improving Intrusion Detection in a Software Defined Network using Hybrid CNN and Bi-LSTM
  30. Track Consensus-Based Labeled Multi-Target Tracking in Mobile Distributed Sensor Network
  31. Workload dynamics implications in permissioned blockchain scalability and performance
  32. Evaluation of Different Machine Learning Classifiers on New IoT Dataset CICIoT2023
  33. Sensing the Health of a Computer Network through Estimation of its Reliability based on Sensors Response Data Analysis and its Impact on Network Management
  34. A deep learning approach to dysarthric utterance classification with BiLSTM-GRU, speech cue filtering, and log mel spectrograms
  35. Speaker independent recognition of low-resourced multilingual Arabic spoken words through hybrid fusion
  36. BREATH-Net: a novel deep learning framework for NO2 prediction using bi-directional encoder with transformer
  37. Network partition detection and recovery with the integration of unmanned aerial vehicle
  38. Review of Authentication Communication Protocols in Mobile(Vehicular) Network via FOG Computing
  39. Implementation of a mobile application for managing academic life of new college students
  40. An Experimental Study on Estimation of Reliability of a Computer Network for the Network of Delhi Development Authority: A Study on Challenges, Experiment and Its Results, Potential Future Avenues and Significance of Ongoing Research
  41. Combating Respiratory Health Issues with Intelligent NO2 Level Prediction from Sentinel 5P Satellite
  42. A novel approach for forecasting PM2.5 pollution in Delhi using CATALYST
  43. Improving speech command recognition through decision-level fusion of deep filtered speech cues
  44. Artificial intelligence in cerebral stroke images classification and segmentation: A comprehensive study
  45. IQR-based approach for DDoS detection and mitigation in SDN
  46. Mitigation of DDoS Attack Using Moving Target Defense in SDN
  47. Security concerns over IoT routing using emerging technologies: A review
  48. Investigating the Impact of Workload Characteristics on the Scalability and Performance of Permissioned Blockchain
  49. Coordinated network partition detection and bi-connected inter-partition topology creation in damaged sensor networks using multiple UAVs
  50. A Rubik's Cube Cryptosystem based Authentication and Session Key generation model driven in Blockchain environment for IoT Security
  51. Forecasting of Satellite Based Carbon-Monoxide Time-Series Data Using a Deep Learning Approach
  52. Image Processing and Intelligent Computing Systems
  53. Secure IoV-enabled systems at Fog Computing
  54. An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks
  55. UAVs assisted Network Partition Detection and Connectivity Restoration in Wireless Sensor and Actor Networks
  56. Partition detection and recovery by UAVs in damaged WSANs using N‐angle clustering
  57. Pathological Analysis of Blood Cells Using Deep Learning Techniques
  58. Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
  59. EpilNet: A Novel Approach to IoT based Epileptic Seizure Prediction and Diagnosis System using Artificial Intelligence
  60. Detecting DDoS Attacks in Cloud Computing Using Extreme Learning Machine and Adaptive Differential Evolution
  61. Distributed Fault-Tolerant Target Tracking Using Event-Based Communication in Internet of Robotic Things
  62. Distributed denial of service attack detection in cloud computing using hybrid extreme learning machine
  63. DDoS Attacks Detection in Cloud Computing Using ANN and Imperialistic Competitive Algorithm
  64. Optimized extreme learning machine for detecting DDoS attacks in cloud computing
  65. Secure Remote E-Voting using Blockchain
  66. Multi-Robot Coordination Analysis, Taxonomy, Challenges and Future Scope
  67. Critical power analysis for control path of a CAT-M based edge device
  68. Addressing Spoofed DDoS Attacks in Software-defined Networking
  69. Detection and Analysis of TCP-SYN DDoS Attack in Software-Defined Networking
  70. Attack and intrusion detection in cloud computing using an ensemble learning approach
  71. Towards Utilizing Blockchain for Countering Distributed Denial-of-Service (DDoS)
  72. DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN
  73. Distributed Denial of Service Attacks and Defense in Cloud Computing
  74. Comparative Study of Different Reduced Precision Techniques in Deep Neural Network
  75. The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things
  76. Multilayer Perceptron and Genetic Algorithm-Based Intrusion Detection Framework for Cloud Environment
  77. Passive Authentication Image Forgery Detection Using Multilayer CNN
  78. Voting extreme learning machine based distributed denial of service attack detection in cloud computing
  79. Software-defined Networking Based DDoS Defense Mechanisms
  80. Software-defined Networking Based DDoS Defense Mechanisms
  81. Voting based Intrusion Detection Framework for Securing Software-Defined Networks
  82. Voting based Intrusion Detection Framework for Securing Software-Defined Networks
  83. Voting‐based intrusion detection framework for securing software‐defined networks
  84. Automated human mind reading using EEG signals for seizure detection
  85. CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis
  86. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review
  87. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review
  88. Target Tracking with Cooperative Networked Robots
  89. Comment on “DIO Suppression Attack Against Routing in the Internet of Things”
  90. Comment on “DIO Suppression Attack Against Routing in the Internet of Things”
  91. Relay Node Placement Techniques in Wireless Sensor Networks
  92. Relay Node Placement Techniques in Wireless Sensor Networks
  93. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review
  94. Addressing Copycat Attacks in IPv6-Based Low Power and Lossy Networks
  95. Trajectory Tracking Control of Unmanned Aerial Vehicle for Autonomous Applications
  96. MockRest—A Generic Approach for Automated Mock Framework for REST APIs Generation
  97. Syntactic Interoperability in Real-Time Systems, ROS 2, and Adaptive AUTOSAR Using Data Distribution Services: An Approach
  98. DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN
  99. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
  100. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
  101. On evaluation of Network Intrusion Detection Systems: Statistical analysis of CIDDS-001 dataset using Machine Learning Techniques
  102. On evaluation of Network Intrusion Detection Systems: Statistical analysis of CIDDS-001 dataset using Machine Learning Techniques
  103. An Obstacle-resistant Relay Node Placement in Constrained Environment
  104. An Obstacle-resistant Relay Node Placement in Constrained Environment
  105. Comment on “DIO Suppression Attack Against Routing in the Internet of Things”
  106. Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networks
  107. Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks
  108. Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks
  109. Machine Learning Based Intrusion Detection Systems for IoT Applications
  110. Path Planning of Unmanned Aerial Vehicles: Current State and Future Challenges
  111. LETSRP: A Secure Routing Protocol for Manets
  112. Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks
  113. API Features Individualizing of Web Services: REST and SOAP
  114. Performance Analysis of WebRTC and SIP for Video Conferencing
  115. Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT
  116. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
  117. Defending DDoS against Software Defined Networks using Entropy
  118. To Evaluate Performance of Routing Protocols Using Reliable LET in MANETs
  119. Distributed Denial of Service Attacks and Defense in Cloud Computing
  120. Security Challenges in Fog Computing
  121. Hybrid Traceback Scheme for DDoS Attacks
  122. Swarm Intelligence-based Partitioned Recovery in Wireless Sensor Networks
  123. Analysis of Routing Attacks on RPL based 6LoWPAN Networks
  124. A New Centralized Solution for Multi-event Wireless Sensor and Actor Networks
  125. Performance Evaluation of Machine Learning Classifiers on Internet of Things Security Dataset
  126. Whale Optimizer to Repair Partitioned Heterogeneous Wireless Sensor Networks
  127. Parametric Analysis of Heart Attack Prediction Using Machine Learning Techniques
  128. Ant colony based IP traceback scheme
  129. Intelligent Traffic Management System for Prioritizing Emergency Vehicles in a Smart City
  130. Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning
  131. An IoT-VANET-Based Traffic Management System for Emergency Vehicles in a Smart City
  132. Federating Disjoint Segments in Wireless Sensor Networks Using Jumping Particle Swarm Optimization
  133. IP Traceback Schemes for DDoS Attack
  134. Meta-heuristic solution for relay nodes placement in constrained environment
  135. Sentiment analysis of the Uri terror attack using Twitter
  136. Healing Partitioned Wireless Sensor Networks
  137. Particle Swarm Optimization for Disconnected Wireless Sensor Networks
  138. Relay node placement in constrained environment
  139. An Obstacle-Resistant Relay Node Placement in Constrained Environment
  140. Restoration of lost connectivity of partitioned wireless sensor networks
  141. Node Stability Aware Energy Efficient Single Node Failure Recovery Approach for WSANs
  142. A multi-criterion fuzzy logic intra-cluster and inter-cluster-based stable cluster head election approach in large scale WSN
  143. A multi-criterion fuzzy logic intra-cluster and inter-cluster-based stable cluster head election approach in large scale WSN
  144. Meta-heuristics for relay node placement problem in wireless sensor networks
  145. Sensor enabled Internet of Things for smart cities
  146. Lost Connectivity Restoration in Partitioned Wireless Sensor Networks
  147. Relay node placement to heal partitioned wireless sensor networks
  148. Relay node placement techniques in wireless sensor networks
  149. Placement of relay nodes in wireless sensor networks
  150. Modified Max-Min Algorithm for Game Theory
  151. Recovery of Lost Connectivity in Wireless Sensor and Actor Networks using Static Sensors as Bridge Routers
  152. A distributed approach for selection of optimal actor nodes in wireless sensor and actor networks
  153. Network connectivity maintenance of WSNs in node failure-prone environment: A detailed survey
  154. A Hybrid Timer Based Single Node Failure Recovery Approach for WSANs
  155. A Cluster-Based Coordination and Communication Framework Using GA for WSANs
  156. MFZLP: Multihop Far Zone Leach Protocol for WSNs
  157. Network Partitioning Recovery Mechanisms in WSANs: a Survey
  158. Performance Evaluation Of Aodv, Dsr, Dsdv Mobile Ad-Hoc Protocols On Different Scenarios: An Analytical Review