All Stories

  1. A Lightweight and Secure Deep Learning Model for Privacy-Preserving Federated Learning in Intelligent Enterprises
  2. Decentralized and robust privacy-preserving model using blockchain-enabled Federated Deep Learning in intelligent enterprises
  3. An Intrusion Detection System Using the Artificial Neural Network-based Approach and Firefly Algorithm
  4. Hardening of the Internet of Things by using an intrusion detection system based on deep learning
  5. Federated Learning: Solutions, Challenges, and Promises
  6. A Self-Adaptive Intrusion Detection System for Securing UAV-to-UAV Communications Based on the Human Immune System in UAV Networks
  7. A Request Redirection Algorithm in Content Delivery Network: Using PROMETHEE Approach
  8. An Approach to Environmental Monitoring in Sparse Linear Wireless Sensor Networks for Energy Conservation Using Dual Sinks
  9. A Crisis-driven e-Learning Capability Maturity Model in the Age of COVID-19 : Process-based Maturity Assessment
  10. Big Data-Aware Intrusion Detection System in Communication Networks: a Deep Learning Approach
  11. Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT
  12. A reliable and secure method for network‐layer attack discovery and elimination in mobile ad‐hoc networks based on a probabilistic threshold
  13. Performance-aware placement and chaining scheme for virtualized network functions: a particle swarm optimization approach
  14. A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema
  15. Congestion control in high‐speed networks using the probabilistic estimation approach
  16. File fragment recognition based on content and statistical features
  17. Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem
  18. A firefly algorithm for power management in wireless sensor networks (WSNs)
  19. Online rating system development using blockchain-based distributed ledger technology
  20. An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks
  21. File Fragment Recognition Based on Content and Statistical Features
  22. Secure Communication between UAVs Using a Method Based on Smart Agents in Unmanned Aerial Vehicles
  23. A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem
  24. Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles
  25. SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism
  26. An Agent-Based Self-Protective Method to Secure Communication between UAVs in Unmanned Aerial Vehicle Networks
  27. Multi-level trust-based intelligence schema for securing of internet of things (IoT)
  28. a novel intelligent agent-based strategy for trust Internet of Things
  29. A novel countermeasure technique to protect WSN
  30. Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks
  31. securing of unmanned aerial systems (uas)
  32. An Artificial Immune Based Approach for Detection Attacks in Wireless Networks
  33. Defending against wormhole attack in MANETs
  34. An Efficient Routing Protocol in Mobile Ad-hoc Networks
  35. Defending against Wormhole Attack in MANET
  36. A New Approach for Improvement Security in Vehicular Ad-hoc Network
  37. A Cluster Based Job Scheduling Algorithm for Grid Computing
  38. Performance Evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV Routing Protocols
  39. An Improvement over AODV Routing Protocol by Limiting Visited Hop Count
  40. Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks