Found: 31
Select item for more details and to access through your institution.
Securing industrial communication with software-defined networking.
- Published in:
- Mathematical Biosciences & Engineering, 2021, v. 18, n. 6, p. 8298, doi. 10.3934/mbe.2021411
- By:
- Publication type:
- Article
Demcrp-et: decentralized multi-criteria ranked prosumers energy trading using distributed ledger technology.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 1, p. 549, doi. 10.1007/s12083-023-01599-2
- By:
- Publication type:
- Article
A Secure Recommendation System for Providing Context-Aware Physical Activity Classification for Users.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/4136909
- By:
- Publication type:
- Article
Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5561816
- By:
- Publication type:
- Article
Evaluating Energy Efficiency of Secure Routing Schemes for Mobile Ad-Hoc Networks.
- Published in:
- International Journal of Next-Generation Computing, 2016, v. 7, n. 2, p. 130
- By:
- Publication type:
- Article
Mobile Ad-hoc Networking with AODV: A Review.
- Published in:
- International Journal of Next-Generation Computing, 2015, v. 6, n. 3, p. 165
- By:
- Publication type:
- Article
Transfer Learning for Audio Waveform to Guitar Chord Spectrograms Using the Convolution Neural Network.
- Published in:
- Mobile Information Systems, 2022, p. 1, doi. 10.1155/2022/8544765
- By:
- Publication type:
- Article
A Review on Machine Learning Strategies for Real-World Engineering Applications.
- Published in:
- Mobile Information Systems, 2022, p. 1, doi. 10.1155/2022/1833507
- By:
- Publication type:
- Article
NNPCov19: Artificial Neural Network-Based Propaganda Identification on Social Media in COVID-19 Era.
- Published in:
- Mobile Information Systems, 2022, p. 1, doi. 10.1155/2022/3412992
- By:
- Publication type:
- Article
FPGA-Based Deep Learning Models for Analysing Corona Using Chest X-Ray Images.
- Published in:
- Mobile Information Systems, 2022, p. 1, doi. 10.1155/2022/2110785
- By:
- Publication type:
- Article
From Blackbox to Explainable AI in Healthcare: Existing Tools and Case Studies.
- Published in:
- Mobile Information Systems, 2022, p. 1, doi. 10.1155/2022/8167821
- By:
- Publication type:
- Article
Ambient Assistive Living for Monitoring the Physical Activity of Diabetic Adults through Body Area Networks.
- Published in:
- Mobile Information Systems, 2022, p. 1, doi. 10.1155/2022/3169927
- By:
- Publication type:
- Article
Enhancing Software-Defined Networks with Intelligent Controllers to Improve First Packet Processing Period.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 3, p. 600, doi. 10.3390/electronics12030600
- By:
- Publication type:
- Article
Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks.
- Published in:
- International Journal of Communication Systems, 2017, v. 30, n. 7, p. n/a, doi. 10.1002/dac.3148
- By:
- Publication type:
- Article
Black-Hole Attack Mitigation in Medical Sensor Networks Using the Enhanced Gravitational Search Algorithm.
- Published in:
- International Journal of Uncertainty, Fuzziness & Knowledge-Based Systems, 2021, v. 29, p. 297, doi. 10.1142/S021848852140016X
- By:
- Publication type:
- Article
A Consolidated Decision Tree-Based Intrusion Detection System for Binary and Multiclass Imbalanced Datasets.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 7, p. 751, doi. 10.3390/math9070751
- By:
- Publication type:
- Article
Performance Assessment of Supervised Classifiers for Designing Intrusion Detection Systems: A Comprehensive Review and Recommendations for Future Research.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 6, p. 690, doi. 10.3390/math9060690
- By:
- Publication type:
- Article
ERABiLNet: enhanced residual attention with bidirectional long short-term memory.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-71299-1
- By:
- Publication type:
- Article
Multiround Transfer Learning and Modified Generative Adversarial Network for Lung Cancer Detection.
- Published in:
- International Journal of Intelligent Systems, 2023, p. 1, doi. 10.1155/2023/6376275
- By:
- Publication type:
- Article
A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/3210207
- By:
- Publication type:
- Article
ML-Based Delay Attack Detection and Isolation for Fault-Tolerant Software-Defined Industrial Networks.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 18, p. 6958, doi. 10.3390/s22186958
- By:
- Publication type:
- Article
Block-Greedy and CNN Based Underwater Image Dehazing for Novel Depth Estimation and Optimal Ambient Light.
- Published in:
- Water (20734441), 2021, v. 13, n. 23, p. 3470, doi. 10.3390/w13233470
- By:
- Publication type:
- Article
Blockchain for Internet of Underwater Things: State-of-the-Art, Applications, Challenges, and Future Directions.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 23, p. 15659, doi. 10.3390/su142315659
- By:
- Publication type:
- Article
Internet of health things-driven deep learning system for detection and classification of cervical cells using transfer learning.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 11, p. 8590, doi. 10.1007/s11227-020-03159-4
- By:
- Publication type:
- Article
Addressing Economic Dispatch Problem with Multiple Fuels Using Oscillatory Particle Swarm Optimization.
- Published in:
- Computers, Materials & Continua, 2021, v. 69, n. 3, p. 2863, doi. 10.32604/cmc.2021.016002
- By:
- Publication type:
- Article
Deep Learning for Intrusion Detection and Security of Internet of Things (IoT): Current Analysis, Challenges, and Possible Solutions.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4016073
- By:
- Publication type:
- Article
Robust Authentication System with Privacy Preservation of Biometrics.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/7857975
- By:
- Publication type:
- Article
Somewhat Homomorphic Encryption: Ring Learning with Error Algorithm for Faster Encryption of IoT Sensor Signal-Based Edge Devices.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/2793998
- By:
- Publication type:
- Article
Early Detection of Cognitive Decline Using Machine Learning Algorithm and Cognitive Ability Test.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4190023
- By:
- Publication type:
- Article
IoT-Assisted Automatic Driver Drowsiness Detection through Facial Movement Analysis Using Deep Learning and a U-Net-Based Architecture.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 1, p. 30, doi. 10.3390/info15010030
- By:
- Publication type:
- Article
SDN Framework for Mitigating Time-Based Delay Attack.
- Published in:
- Journal of Circuits, Systems & Computers, 2022, v. 31, n. 15, p. 1, doi. 10.1142/S0218126622502644
- By:
- Publication type:
- Article