All Stories

  1. Security of LLM-based agents regarding attacks, defenses, and applications: A comprehensive survey
  2. Mitigating massive access with Quasi-Deterministic Transmission: Experiments and stationary analysis
  3. Data Driven Optimum Cyberattack Mitigation
  4. Is ChatGPT Trustworthy Enough? A Review
  5. Minimizing Delay and Power Consumption at the Edge
  6. Adaptive Attack Mitigation for IoV Flood Attacks
  7. Graph Neural Networks for Trust Evaluation: Criteria, State-of-the-Art, and Future Directions
  8. Time-Dependent Analysis of the Interaction Between Energy Harvesting, Leakage, and Consumption Processes in a Green IoT Device
  9. A Survey on Cross-Shard Transaction Allocation Optimization and Processing Mechanisms
  10. DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with online learning for health Internet of Things and Internet of Vehicles
  11. Digital Phenotyping and Feature Extraction on Smartphone Data for Depression Detection
  12. Impact of IoT System Imperfections and Passenger Errors on Cruise Ship Evacuation Delay
  13. Online Self-Supervised Deep Learning for Intrusion Detection Systems
  14. System Wide Vulnerability and Trust in Multi-Component Communication System Software
  15. Real-Time Cyberattack Detection with Offline and Online Learning
  16. Modelling of the Energy Depletion Process and Battery Depletion Attacks for Battery-Powered Internet of Things (IoT) Devices
  17. IoT Network Cybersecurity Assessment With the Associated Random Neural Network
  18. G-Networks Can Detect Different Types of Cyberattacks
  19. Improving Massive Access to IoT Gateways
  20. Proceedings of The 17th International Symposium on Computer and Information Sciences
  21. Botnet Attack Detection with Incremental Online Learning
  22. Energy, QoS and Security Aware Edge Services
  23. Mitigating the Massive Access Problem in the Internet of Things
  24. Optimizing Energy Usage for an Electric Drone
  25. Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices
  26. Reinforcement Learning and Energy-Aware Routing
  27. Smart SDN Management of Fog Services to Optimize QoS and Energy
  28. Time-Dependent Performance of a Multi-Hop Software Defined Network
  29. Efficient Feature Selection for Static Analysis Vulnerability Prediction
  30. Minimizing Energy and Computation in Long-Running Software
  31. Investigating the Interaction between Energy Consumption, Quality of Service, Reliability, Security, and Maintainability of Computer Systems and Networks
  32. Self-Aware Networks That Optimize Security, QoS, and Energy
  33. Auction-Based Data Transaction in Mobile Networks: Data Allocation Design and Performance Analysis
  34. Optimal Fog Services Placement in SDN IoT Network Using Random Neural Networks and Cognitive Network Map
  35. Performance Optimization With Energy Packets
  36. A Survey of Algorithms and Systems for Evacuating People in Confined Spaces
  37. Double Auction Mechanism Design for Video Caching in Heterogeneous Ultra-Dense Networks
  38. Product-Form Solution for Cascade Networks With Intermittent Energy
  39. Adaptive Dispatching of Tasks in the Cloud
  40. Contract Design for Traffic Offloading and Resource Allocation in Heterogeneous Ultra-Dense Networks
  41. Intelligent search with deep learning clusters
  42. Energy Packet Networks With Energy Harvesting
  43. Directional Navigation Improves Opportunistic Communication for Emergencies
  44. Emergency Navigation without an Infrastructure
  45. Cognitive Packet Network for Bilateral Asymmetric Connections
  46. Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks
  47. Cognitive users with useful vacations
  48. Time and energy in team-based search
  49. Graph and Analytical Models for Emergency Evacuation
  50. Scalable optimization in grid, cloud, and intelligent network computing - foreword
  51. Energy-Aware Admission Control for Wired Networks
  52. Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach
  53. NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem
  54. Optimal Behaviour of Smart Wireless Users
  55. Routing Emergency Evacuees with Cognitive Packet Networks
  56. Large scale simulation for human evacuation and rescue
  57. Choosing a Local or Remote Cloud
  58. A Distributed Simulation Platform for Urban Security
  59. Reconstruction of Large-Scale Gene Regulatory Networks Using Bayesian Model Averaging
  60. Stochastic Gene Expression Modeling with Hill Function for Switch-Like Gene Responses
  61. Natural Computation
  62. Spatial Computers for Emergency Support
  63. Packet Delay and Energy Consumption in Non-homogeneous Networks
  64. Computer and Information Sciences II
  65. Power Savings in Packet Networks via Optimised Routing
  66. Introduction to the Special Issue on G-Networks and the Random Neural Network
  67. Ubiquity symposium: Natural Computation
  68. A Framework for Energy-Aware Routing in Packet Networks
  69. Search in unknown random environments
  70. A distributed admission control mechanism for multi-criteria QoS
  71. An Interview with Erol Gelenbe
  72. Adaptive packet prioritisation for large wireless sensor networks
  73. A random neural network approach to an assets to tasks assignment problem
  74. Distributed Building Evacuation Simulator for Smart Emergency Management
  75. Fast Distributed Near-Optimum Assignment of Assets to Tasks
  76. Editorial
  77. A Sustainable Model for Integrating Current Topics in Machine Learning Research Into the Undergraduate Curriculum
  78. Adaptive Random Re-Routing for Differentiated QoS in Sensor Networks
  79. Energy-Efficient Cloud Computing
  80. Steps toward self-aware networks
  81. Analysis of single and networked auctions
  82. Anomaly detection in gene expression via stochastic models of gene regulatory networks
  83. Random Neural Networks with Synchronized Interactions
  84. Adaptive QoS routing for significant events in wireless sensor networks
  85. Quality of information: An empirical approach
  86. Introduction. Stochastic networks: from theory to practice
  87. Adaptive prefetching algorithm in disk controllers
  88. Network of interacting synthetic molecules in steady state
  89. Synchronized Interactions in Spiked Neuronal Networks
  90. Discussant Contributions for the Computer Journal Lecture by Erol Gelenbe
  91. Editorial: Introduction to the Special Issue
  92. Hyperion Next-Generation Battlespace Information Services
  93. Steady-state solution of probabilistic gene regulatory networks
  94. Controlling Access to Preserve QoS in a Self-Aware Network
  95. A diffusion model for packet travel time in a random multihop medium
  96. A self-aware approach to denial of service defence
  97. Dealing with software viruses: A biological paradigm
  98. A survey of autonomic communications
  99. Genetic Algorithms for Route Discovery
  100. CAM04-1: Admission Control in Self Aware Networks
  101. Modelling Large Scale Autonomous Systems
  102. Introduction
  103. A mathematical approach for mission planning and rehearsal
  104. Fusing terrain and goals: agent control in urban environments
  105. Editorial: Building Adaptivity into Computer Networks
  106. Towards autonomic networks
  107. Simulating autonomous agents in augmented reality
  108. Defending networks against denial-of-service attacks
  109. Self-aware networks and QoS
  110. Wafer surface reconstruction from top–down scanning electron microscope images
  111. ENERGY AWARENESS AND AD HOC ROUTING
  112. Learning in the multiple class random neural network
  113. G-networks with resets
  114. Simulating autonomous agents wtih augmented reality
  115. Talking with Erol Gelenbe
  116. Measurement and performance of a cognitive packet network
  117. Adaptive control of pre-fetching
  118. Advanced Performance Modeling
  119. Design and performance of cognitive packet networks
  120. Evaluating neural network reconstruction of wafer profile from electron microscopy
  121. Learning and generating color textures with recurrent multiple class random neural networks
  122. Video compression with wavelets and random neural network approximations
  123. Simulation with learning agents
  124. On G-networks and resource allocation in multimedia systems
  125. The first decade of G-networks
  126. Random neural network texture model
  127. Guest editorial: intelligent techniques in high speed networks
  128. Video quality and traffic QoS in learning-based subsampled and receiver-interpolated video sequences
  129. Area-based results for mine detection
  130. Radial signatures and their application to target recognition
  131. Performance considerations in totally mobile wireless
  132. Random Neural Networks with Multiple Classes of Signals
  133. Approximate analysis of coupled queueing in ATM networks
  134. Function approximation with spiked random networks
  135. Oscillatory corticothalamic response to somatosensory input
  136. Optimum cell duplication or replication for multicast applications
  137. Feature-based RNN target recognition
  138. Autonomous search for mines: II. Hierarchical search using sensory data
  139. Autonomous search for mines
  140. Biologically inspired operations research
  141. G-networks with multiple classes of signals and positive customers
  142. Image processing with the random neural network
  143. Random neural network recognition of shaped objects in strong clutter
  144. Learning neural networks for detection and classification of synchronous recurrent transient signals
  145. Image and video compression
  146. A class of genetic algorithms with analytical solution
  147. Autonomous search by robots and animals: A survey
  148. Biologically inspired autonomous systems
  149. Call establishment overload in large ATM networks
  150. Bandwidth allocation and call admission control in high-speed networks
  151. Execution of compute-intensive applications into parallel machines
  152. Scheduling of distributed tasks for survivability of the application
  153. Task assignment and transaction clustering heuristics for distributed systems
  154. Improved neural heuristics for multicast routing
  155. Traffic and video quality with adaptive neural compression
  156. Block loss reduction in ATM networks
  157. Diffusion based statistical call admission control in ATM
  158. G-networks with multiple classes of negative and positive customers
  159. Low bit-rate video compression with neural networks and temporal subsampling
  160. Neural network methods for volumetric magnetic resonance imaging of the human brain
  161. G-networks: a unifying model for neural and queueing networks
  162. G-networks by triggered customer movement
  163. Learning in the Recurrent Random Neural Network
  164. PREFACE
  165. G-Nets and Learning Recurrent Random Networks
  166. Learning in the Recurrent Random Neural Network
  167. Generalised Associative Memory and the Computation of Membership Functions
  168. MULTIPLE CLASS G-NETWORKS
  169. Global behavior of homogeneous random neural systems
  170. Distributed associative memory and the computation of membership functions
  171. Product-form queueing networks with negative and positive customers
  172. FLEXSIM: A flexible manufacturing system simulator
  173. Queues with negative arrivals
  174. Queues with Slowly Varying Arrival and Service Processes
  175. Load sharing in distributed systems with failures
  176. Analysis of a conveyor queue in a flexible manufacturing system
  177. Recent results on queues with time variations
  178. Stationary deterministic flows: II. The single-server queue
  179. Availability of a distributed computer system with failures
  180. An End-to-End Approach to the Resequencing Problem
  181. On the modeling of parallel access to shared data
  182. Stationary deterministic flows in discrete systems 1
  183. On the size of projections: I
  184. An analysis of parallel-read sequential-write systems
  185. Probabilistic models of computer systems
  186. On the Optimum Checkpoint Interval
  187. Performance evaluation of the HDLC protocol
  188. Performance of rollback recovery systems under intermittent failures
  189. A queue with server of walking type (autonomous service)
  190. An Analytic Evaluation of the Performance of the "Send and Wait" Protocol
  191. Random Injection Control of Multiprogramming in Virtual Memory
  192. Stability and Optimal Control of the Packet Switching Broadcast Channel
  193. Adaptive Allocation of Central Processing Unit Quanta
  194. Probabilistic models of computer systems?Part I (exact results)
  195. Preface
  196. Operating Systems
  197. An Autonomic Approach to Denial of Service Defence
  198. QoS and Routing in the Cognitive Packet Network
  199. Autonomous smart routing for network QoS
  200. Users and services in intelligent networks