All Stories

  1. Security of LLM-based agents regarding attacks, defenses, and applications: A comprehensive survey
  2. IoT-Driven Pull Scheduling to Avoid Congestion in Human Emergency Evacuation
  3. Mitigating massive access with Quasi-Deterministic Transmission: Experiments and stationary analysis
  4. Data Driven Optimum Cyberattack Mitigation
  5. Is ChatGPT Trustworthy Enough? A Review
  6. Minimizing Delay and Power Consumption at the Edge
  7. Adaptive Attack Mitigation for IoV Flood Attacks
  8. Graph Neural Networks for Trust Evaluation: Criteria, State-of-the-Art, and Future Directions
  9. Time-Dependent Analysis of the Interaction Between Energy Harvesting, Leakage, and Consumption Processes in a Green IoT Device
  10. A Survey on Cross-Shard Transaction Allocation Optimization and Processing Mechanisms
  11. DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with online learning for health Internet of Things and Internet of Vehicles
  12. Digital Phenotyping and Feature Extraction on Smartphone Data for Depression Detection
  13. Impact of IoT System Imperfections and Passenger Errors on Cruise Ship Evacuation Delay
  14. Online Self-Supervised Deep Learning for Intrusion Detection Systems
  15. System Wide Vulnerability and Trust in Multi-Component Communication System Software
  16. Real-Time Cyberattack Detection with Offline and Online Learning
  17. Modelling of the Energy Depletion Process and Battery Depletion Attacks for Battery-Powered Internet of Things (IoT) Devices
  18. IoT Network Cybersecurity Assessment With the Associated Random Neural Network
  19. G-Networks Can Detect Different Types of Cyberattacks
  20. Improving Massive Access to IoT Gateways
  21. Proceedings of The 17th International Symposium on Computer and Information Sciences
  22. Botnet Attack Detection with Incremental Online Learning
  23. Energy, QoS and Security Aware Edge Services
  24. Mitigating the Massive Access Problem in the Internet of Things
  25. Optimizing Energy Usage for an Electric Drone
  26. Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices
  27. Reinforcement Learning and Energy-Aware Routing
  28. Smart SDN Management of Fog Services to Optimize QoS and Energy
  29. Time-Dependent Performance of a Multi-Hop Software Defined Network
  30. Efficient Feature Selection for Static Analysis Vulnerability Prediction
  31. Minimizing Energy and Computation in Long-Running Software
  32. Investigating the Interaction between Energy Consumption, Quality of Service, Reliability, Security, and Maintainability of Computer Systems and Networks
  33. Self-Aware Networks That Optimize Security, QoS, and Energy
  34. Auction-Based Data Transaction in Mobile Networks: Data Allocation Design and Performance Analysis
  35. Optimal Fog Services Placement in SDN IoT Network Using Random Neural Networks and Cognitive Network Map
  36. Performance Optimization With Energy Packets
  37. A Survey of Algorithms and Systems for Evacuating People in Confined Spaces
  38. Double Auction Mechanism Design for Video Caching in Heterogeneous Ultra-Dense Networks
  39. Product-Form Solution for Cascade Networks With Intermittent Energy
  40. Adaptive Dispatching of Tasks in the Cloud
  41. Contract Design for Traffic Offloading and Resource Allocation in Heterogeneous Ultra-Dense Networks
  42. Intelligent search with deep learning clusters
  43. Energy Packet Networks With Energy Harvesting
  44. Directional Navigation Improves Opportunistic Communication for Emergencies
  45. Emergency Navigation without an Infrastructure
  46. Cognitive Packet Network for Bilateral Asymmetric Connections
  47. Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks
  48. Cognitive users with useful vacations
  49. Time and energy in team-based search
  50. Graph and Analytical Models for Emergency Evacuation
  51. Scalable optimization in grid, cloud, and intelligent network computing - foreword
  52. Energy-Aware Admission Control for Wired Networks
  53. Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach
  54. NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem
  55. Optimal Behaviour of Smart Wireless Users
  56. Routing Emergency Evacuees with Cognitive Packet Networks
  57. Large scale simulation for human evacuation and rescue
  58. Choosing a Local or Remote Cloud
  59. A Distributed Simulation Platform for Urban Security
  60. Reconstruction of Large-Scale Gene Regulatory Networks Using Bayesian Model Averaging
  61. Stochastic Gene Expression Modeling with Hill Function for Switch-Like Gene Responses
  62. Natural Computation
  63. Spatial Computers for Emergency Support
  64. Packet Delay and Energy Consumption in Non-homogeneous Networks
  65. Computer and Information Sciences II
  66. Power Savings in Packet Networks via Optimised Routing
  67. Introduction to the Special Issue on G-Networks and the Random Neural Network
  68. Ubiquity symposium: Natural Computation
  69. A Framework for Energy-Aware Routing in Packet Networks
  70. Search in unknown random environments
  71. A distributed admission control mechanism for multi-criteria QoS
  72. An Interview with Erol Gelenbe
  73. Adaptive packet prioritisation for large wireless sensor networks
  74. A random neural network approach to an assets to tasks assignment problem
  75. Distributed Building Evacuation Simulator for Smart Emergency Management
  76. Fast Distributed Near-Optimum Assignment of Assets to Tasks
  77. Editorial
  78. A Sustainable Model for Integrating Current Topics in Machine Learning Research Into the Undergraduate Curriculum
  79. Adaptive Random Re-Routing for Differentiated QoS in Sensor Networks
  80. Energy-Efficient Cloud Computing
  81. Steps toward self-aware networks
  82. Analysis of single and networked auctions
  83. Anomaly detection in gene expression via stochastic models of gene regulatory networks
  84. Random Neural Networks with Synchronized Interactions
  85. Adaptive QoS routing for significant events in wireless sensor networks
  86. Quality of information: An empirical approach
  87. Introduction. Stochastic networks: from theory to practice
  88. Adaptive prefetching algorithm in disk controllers
  89. Network of interacting synthetic molecules in steady state
  90. Synchronized Interactions in Spiked Neuronal Networks
  91. Discussant Contributions for the Computer Journal Lecture by Erol Gelenbe
  92. Editorial: Introduction to the Special Issue
  93. Hyperion Next-Generation Battlespace Information Services
  94. Steady-state solution of probabilistic gene regulatory networks
  95. Controlling Access to Preserve QoS in a Self-Aware Network
  96. A diffusion model for packet travel time in a random multihop medium
  97. A self-aware approach to denial of service defence
  98. Dealing with software viruses: A biological paradigm
  99. A survey of autonomic communications
  100. Genetic Algorithms for Route Discovery
  101. CAM04-1: Admission Control in Self Aware Networks
  102. Modelling Large Scale Autonomous Systems
  103. Introduction
  104. A mathematical approach for mission planning and rehearsal
  105. Fusing terrain and goals: agent control in urban environments
  106. Editorial: Building Adaptivity into Computer Networks
  107. Towards autonomic networks
  108. Simulating autonomous agents in augmented reality
  109. Defending networks against denial-of-service attacks
  110. Self-aware networks and QoS
  111. Wafer surface reconstruction from top–down scanning electron microscope images
  112. ENERGY AWARENESS AND AD HOC ROUTING
  113. Learning in the multiple class random neural network
  114. G-networks with resets
  115. Simulating autonomous agents wtih augmented reality
  116. Talking with Erol Gelenbe
  117. Measurement and performance of a cognitive packet network
  118. Adaptive control of pre-fetching
  119. Advanced Performance Modeling
  120. Design and performance of cognitive packet networks
  121. Evaluating neural network reconstruction of wafer profile from electron microscopy
  122. Learning and generating color textures with recurrent multiple class random neural networks
  123. Video compression with wavelets and random neural network approximations
  124. Simulation with learning agents
  125. On G-networks and resource allocation in multimedia systems
  126. The first decade of G-networks
  127. Random neural network texture model
  128. Guest editorial: intelligent techniques in high speed networks
  129. Video quality and traffic QoS in learning-based subsampled and receiver-interpolated video sequences
  130. Area-based results for mine detection
  131. Radial signatures and their application to target recognition
  132. Performance considerations in totally mobile wireless
  133. Random Neural Networks with Multiple Classes of Signals
  134. Approximate analysis of coupled queueing in ATM networks
  135. Function approximation with spiked random networks
  136. Oscillatory corticothalamic response to somatosensory input
  137. Optimum cell duplication or replication for multicast applications
  138. Feature-based RNN target recognition
  139. Autonomous search for mines: II. Hierarchical search using sensory data
  140. Autonomous search for mines
  141. Biologically inspired operations research
  142. G-networks with multiple classes of signals and positive customers
  143. Image processing with the random neural network
  144. Random neural network recognition of shaped objects in strong clutter
  145. Learning neural networks for detection and classification of synchronous recurrent transient signals
  146. Image and video compression
  147. A class of genetic algorithms with analytical solution
  148. Autonomous search by robots and animals: A survey
  149. Biologically inspired autonomous systems
  150. Call establishment overload in large ATM networks
  151. Bandwidth allocation and call admission control in high-speed networks
  152. Execution of compute-intensive applications into parallel machines
  153. Scheduling of distributed tasks for survivability of the application
  154. Task assignment and transaction clustering heuristics for distributed systems
  155. Improved neural heuristics for multicast routing
  156. Traffic and video quality with adaptive neural compression
  157. Block loss reduction in ATM networks
  158. Diffusion based statistical call admission control in ATM
  159. G-networks with multiple classes of negative and positive customers
  160. Low bit-rate video compression with neural networks and temporal subsampling
  161. Neural network methods for volumetric magnetic resonance imaging of the human brain
  162. G-networks: a unifying model for neural and queueing networks
  163. G-networks by triggered customer movement
  164. Learning in the Recurrent Random Neural Network
  165. PREFACE
  166. G-Nets and Learning Recurrent Random Networks
  167. Learning in the Recurrent Random Neural Network
  168. Generalised Associative Memory and the Computation of Membership Functions
  169. MULTIPLE CLASS G-NETWORKS
  170. Global behavior of homogeneous random neural systems
  171. Distributed associative memory and the computation of membership functions
  172. Product-form queueing networks with negative and positive customers
  173. FLEXSIM: A flexible manufacturing system simulator
  174. Queues with negative arrivals
  175. Queues with Slowly Varying Arrival and Service Processes
  176. Load sharing in distributed systems with failures
  177. Analysis of a conveyor queue in a flexible manufacturing system
  178. Recent results on queues with time variations
  179. Stationary deterministic flows: II. The single-server queue
  180. Availability of a distributed computer system with failures
  181. An End-to-End Approach to the Resequencing Problem
  182. On the modeling of parallel access to shared data
  183. Stationary deterministic flows in discrete systems 1
  184. On the size of projections: I
  185. An analysis of parallel-read sequential-write systems
  186. Probabilistic models of computer systems
  187. On the Optimum Checkpoint Interval
  188. Performance evaluation of the HDLC protocol
  189. Performance of rollback recovery systems under intermittent failures
  190. A queue with server of walking type (autonomous service)
  191. An Analytic Evaluation of the Performance of the "Send and Wait" Protocol
  192. Random Injection Control of Multiprogramming in Virtual Memory
  193. Stability and Optimal Control of the Packet Switching Broadcast Channel
  194. Adaptive Allocation of Central Processing Unit Quanta
  195. Probabilistic models of computer systems?Part I (exact results)
  196. Preface
  197. Operating Systems
  198. An Autonomic Approach to Denial of Service Defence
  199. QoS and Routing in the Cognitive Packet Network
  200. Autonomous smart routing for network QoS
  201. Users and services in intelligent networks