All Stories

  1. A Decentralized Traffic Light Scheduling Algorithm for Intelligent Transportation Systems
  2. Evaluating Suprasegmental Features for Phonological Fusion and Spectrogram-Based Speech Command Recognition
  3. Comparative Study for Different Machine Learning Model for Parkinson’s Disease Detection
  4. Investigating the performance vs. computational complexity tradeoff in cross-domain fire risk detection
  5. Revocable and Privacy‐Preserving CP‐ABE Scheme for Secure mHealth Data Access in Blockchain
  6. Secure and Efficient Routing in Fog-Enabled VANETs: A Clustering-Based Approach
  7. Exploring the Transformative Impact of Blockchain Technology on Healthcare: Security, Challenges, Benefits, and Future Outlook
  8. A Novel Pyra-Cryptosystem Relying Secure Light-Weight Data Exchange, Peer-to-Peer Authentication, and Secure Communication Session Key Management Approach-Based Model for Internet of Things Network Security
  9. Network Partitioning Problem and UAVs' Integration for Efficient Connectivity Restoration: A Systematic Review
  10. AI vs. AI: Deep Learning Approaches for Detecting Deepfake Content
  11. Enhancing Veracity: Leveraging Machine Learning Ensemble Methods For Fake News Detection
  12. Machine Learning and Deep Learning in Fake News Detection: An In-Depth Review
  13. Multi-Head Self-Attention Mechanism for Enhanced Deepfake Detection
  14. Unveiling The Power Deep Learning Models for Skin Cancer Detection
  15. A Study of the Security and Privacy Risks in Health-Related Mobile Applications in India
  16. Multimodal Integration of Mel Spectrograms and Text Transcripts for Enhanced Automatic Speech Recognition: Leveraging Extractive Transformer‐Based Approaches and Late Fusion Strategies
  17. Dhivehi Speech Recognition: A Multimodal Approach for Dhivehi Language in Resource-Constrained Settings
  18. A Raspberry Pi 4 and Arduino-based Automated Intercom Door Lock System
  19. A Comparative Study of Deep Learning Models for Brain Tumor Classification
  20. Performance analysis of RPL protocol in different nodes positioning using Contiki Cooja
  21. A Comparative Study of Machine Learning Models for Network Traffic Classification in the IoT Landscape
  22. Analyzing Yoga Pose Recognition: A Comparison of MediaPipe and YOLO Keypoint Detection with Ensemble Techniques
  23. Improving Intrusion Detection in a Software Defined Network using Hybrid CNN and Bi-LSTM
  24. Track Consensus-Based Labeled Multi-Target Tracking in Mobile Distributed Sensor Network
  25. Workload dynamics implications in permissioned blockchain scalability and performance
  26. Evaluation of Different Machine Learning Classifiers on New IoT Dataset CICIoT2023
  27. Sensing the Health of a Computer Network through Estimation of its Reliability based on Sensors Response Data Analysis and its Impact on Network Management
  28. A deep learning approach to dysarthric utterance classification with BiLSTM-GRU, speech cue filtering, and log mel spectrograms
  29. Speaker independent recognition of low-resourced multilingual Arabic spoken words through hybrid fusion
  30. BREATH-Net: a novel deep learning framework for NO2 prediction using bi-directional encoder with transformer
  31. Network partition detection and recovery with the integration of unmanned aerial vehicle
  32. Review of Authentication Communication Protocols in Mobile(Vehicular) Network via FOG Computing
  33. Implementation of a mobile application for managing academic life of new college students
  34. An Experimental Study on Estimation of Reliability of a Computer Network for the Network of Delhi Development Authority: A Study on Challenges, Experiment and Its Results, Potential Future Avenues and Significance of Ongoing Research
  35. Combating Respiratory Health Issues with Intelligent NO2 Level Prediction from Sentinel 5P Satellite
  36. A novel approach for forecasting PM2.5 pollution in Delhi using CATALYST
  37. Improving speech command recognition through decision-level fusion of deep filtered speech cues
  38. Artificial intelligence in cerebral stroke images classification and segmentation: A comprehensive study
  39. IQR-based approach for DDoS detection and mitigation in SDN
  40. Mitigation of DDoS Attack Using Moving Target Defense in SDN
  41. Security concerns over IoT routing using emerging technologies: A review
  42. Investigating the Impact of Workload Characteristics on the Scalability and Performance of Permissioned Blockchain
  43. Coordinated network partition detection and bi-connected inter-partition topology creation in damaged sensor networks using multiple UAVs
  44. A Rubik's Cube Cryptosystem based Authentication and Session Key generation model driven in Blockchain environment for IoT Security
  45. Forecasting of Satellite Based Carbon-Monoxide Time-Series Data Using a Deep Learning Approach
  46. Image Processing and Intelligent Computing Systems
  47. Secure IoV-enabled systems at Fog Computing
  48. An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks
  49. UAVs assisted Network Partition Detection and Connectivity Restoration in Wireless Sensor and Actor Networks
  50. Partition detection and recovery by UAVs in damaged WSANs using N‐angle clustering
  51. Pathological Analysis of Blood Cells Using Deep Learning Techniques
  52. Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
  53. EpilNet: A Novel Approach to IoT based Epileptic Seizure Prediction and Diagnosis System using Artificial Intelligence
  54. Detecting DDoS Attacks in Cloud Computing Using Extreme Learning Machine and Adaptive Differential Evolution
  55. Distributed Fault-Tolerant Target Tracking Using Event-Based Communication in Internet of Robotic Things
  56. Distributed denial of service attack detection in cloud computing using hybrid extreme learning machine
  57. DDoS Attacks Detection in Cloud Computing Using ANN and Imperialistic Competitive Algorithm
  58. Optimized extreme learning machine for detecting DDoS attacks in cloud computing
  59. Secure Remote E-Voting using Blockchain
  60. Multi-Robot Coordination Analysis, Taxonomy, Challenges and Future Scope
  61. Critical power analysis for control path of a CAT-M based edge device
  62. Addressing Spoofed DDoS Attacks in Software-defined Networking
  63. Detection and Analysis of TCP-SYN DDoS Attack in Software-Defined Networking
  64. Attack and intrusion detection in cloud computing using an ensemble learning approach
  65. Towards Utilizing Blockchain for Countering Distributed Denial-of-Service (DDoS)
  66. DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN
  67. Distributed Denial of Service Attacks and Defense in Cloud Computing
  68. Comparative Study of Different Reduced Precision Techniques in Deep Neural Network
  69. The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things
  70. Multilayer Perceptron and Genetic Algorithm-Based Intrusion Detection Framework for Cloud Environment
  71. Passive Authentication Image Forgery Detection Using Multilayer CNN
  72. Voting extreme learning machine based distributed denial of service attack detection in cloud computing
  73. Software-defined Networking Based DDoS Defense Mechanisms
  74. Software-defined Networking Based DDoS Defense Mechanisms
  75. Voting based Intrusion Detection Framework for Securing Software-Defined Networks
  76. Voting based Intrusion Detection Framework for Securing Software-Defined Networks
  77. Voting‐based intrusion detection framework for securing software‐defined networks
  78. Automated human mind reading using EEG signals for seizure detection
  79. CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis
  80. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review
  81. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review
  82. Target Tracking with Cooperative Networked Robots
  83. Comment on “DIO Suppression Attack Against Routing in the Internet of Things”
  84. Comment on “DIO Suppression Attack Against Routing in the Internet of Things”
  85. Relay Node Placement Techniques in Wireless Sensor Networks
  86. Relay Node Placement Techniques in Wireless Sensor Networks
  87. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review
  88. Addressing Copycat Attacks in IPv6-Based Low Power and Lossy Networks
  89. Trajectory Tracking Control of Unmanned Aerial Vehicle for Autonomous Applications
  90. MockRest—A Generic Approach for Automated Mock Framework for REST APIs Generation
  91. Syntactic Interoperability in Real-Time Systems, ROS 2, and Adaptive AUTOSAR Using Data Distribution Services: An Approach
  92. DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN
  93. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
  94. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
  95. On evaluation of Network Intrusion Detection Systems: Statistical analysis of CIDDS-001 dataset using Machine Learning Techniques
  96. On evaluation of Network Intrusion Detection Systems: Statistical analysis of CIDDS-001 dataset using Machine Learning Techniques
  97. An Obstacle-resistant Relay Node Placement in Constrained Environment
  98. An Obstacle-resistant Relay Node Placement in Constrained Environment
  99. Comment on “DIO Suppression Attack Against Routing in the Internet of Things”
  100. Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networks
  101. Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks
  102. Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks
  103. Machine Learning Based Intrusion Detection Systems for IoT Applications
  104. Path Planning of Unmanned Aerial Vehicles: Current State and Future Challenges
  105. LETSRP: A Secure Routing Protocol for Manets
  106. Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks
  107. API Features Individualizing of Web Services: REST and SOAP
  108. Performance Analysis of WebRTC and SIP for Video Conferencing
  109. Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT
  110. ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
  111. Defending DDoS against Software Defined Networks using Entropy
  112. To Evaluate Performance of Routing Protocols Using Reliable LET in MANETs
  113. Distributed Denial of Service Attacks and Defense in Cloud Computing
  114. Security Challenges in Fog Computing
  115. Hybrid Traceback Scheme for DDoS Attacks
  116. Swarm Intelligence-based Partitioned Recovery in Wireless Sensor Networks
  117. Analysis of Routing Attacks on RPL based 6LoWPAN Networks
  118. A New Centralized Solution for Multi-event Wireless Sensor and Actor Networks
  119. Performance Evaluation of Machine Learning Classifiers on Internet of Things Security Dataset
  120. Whale Optimizer to Repair Partitioned Heterogeneous Wireless Sensor Networks
  121. Parametric Analysis of Heart Attack Prediction Using Machine Learning Techniques
  122. Ant colony based IP traceback scheme
  123. Intelligent Traffic Management System for Prioritizing Emergency Vehicles in a Smart City
  124. Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning
  125. An IoT-VANET-Based Traffic Management System for Emergency Vehicles in a Smart City
  126. Federating Disjoint Segments in Wireless Sensor Networks Using Jumping Particle Swarm Optimization
  127. IP Traceback Schemes for DDoS Attack
  128. Meta-heuristic solution for relay nodes placement in constrained environment
  129. Sentiment analysis of the Uri terror attack using Twitter
  130. Healing Partitioned Wireless Sensor Networks
  131. Particle Swarm Optimization for Disconnected Wireless Sensor Networks
  132. Relay node placement in constrained environment
  133. An Obstacle-Resistant Relay Node Placement in Constrained Environment
  134. Restoration of lost connectivity of partitioned wireless sensor networks
  135. Node Stability Aware Energy Efficient Single Node Failure Recovery Approach for WSANs
  136. A multi-criterion fuzzy logic intra-cluster and inter-cluster-based stable cluster head election approach in large scale WSN
  137. A multi-criterion fuzzy logic intra-cluster and inter-cluster-based stable cluster head election approach in large scale WSN
  138. Meta-heuristics for relay node placement problem in wireless sensor networks
  139. Sensor enabled Internet of Things for smart cities
  140. Lost Connectivity Restoration in Partitioned Wireless Sensor Networks
  141. Relay node placement to heal partitioned wireless sensor networks
  142. Relay node placement techniques in wireless sensor networks
  143. Placement of relay nodes in wireless sensor networks
  144. Modified Max-Min Algorithm for Game Theory
  145. Recovery of Lost Connectivity in Wireless Sensor and Actor Networks using Static Sensors as Bridge Routers
  146. A distributed approach for selection of optimal actor nodes in wireless sensor and actor networks
  147. Network connectivity maintenance of WSNs in node failure-prone environment: A detailed survey
  148. A Hybrid Timer Based Single Node Failure Recovery Approach for WSANs
  149. A Cluster-Based Coordination and Communication Framework Using GA for WSANs
  150. MFZLP: Multihop Far Zone Leach Protocol for WSNs
  151. Network Partitioning Recovery Mechanisms in WSANs: a Survey
  152. Performance Evaluation Of Aodv, Dsr, Dsdv Mobile Ad-Hoc Protocols On Different Scenarios: An Analytical Review