Works in Peer-to-Peer Networking & Applications, 2025, Vol 18, Issue 2
Results: 51
Intrusion defense: Leveraging ant colony optimization for enhanced multi-optimization in network security.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-025-01911-2
- By:
- Publication type:
- Article
A highly secure and stable energy aware multi-objective constraints-based hybrid optimization algorithms for effective optimal cluster head selection and routing in wireless sensor networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-025-01918-9
- By:
- Publication type:
- Article
A binary multi-objective approach for solving the WMNs topology planning problem.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-025-01916-x
- By:
- Publication type:
- Article
Service caching with multi-agent reinforcement learning in cloud-edge collaboration computing.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-025-01915-y
- By:
- Publication type:
- Article
Service caching with multi-agent reinforcement learning in cloud-edge collaboration computing.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-025-01915-y
- By:
- Publication type:
- Article
CoHide: Overlapping community hiding algorithm based on multi-criteria learning optimization.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-025-01909-w
- By:
- Publication type:
- Article
CoHide: Overlapping community hiding algorithm based on multi-criteria learning optimization.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-025-01909-w
- By:
- Publication type:
- Article
A decentralized scheme for multi-user edge computing task offloading based on dynamic pricing.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-025-01904-1
- By:
- Publication type:
- Article
AccessChain: A scalable and privacy-preserving access control scheme for blockchain-based IoT.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-025-01906-z
- By:
- Publication type:
- Article
Research on distributed UWSN power control algorithm based on cooperative game.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01897-3
- By:
- Publication type:
- Article
A comprehensive and efficient CP-ABE scheme with full policy hiding and pre-decryption verification in peer-to-peer cyber-physical systems.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-025-01912-1
- By:
- Publication type:
- Article
An efficient and private economic evaluation scheme in data markets.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01820-w
- By:
- Publication type:
- Article
Joint scheduling and routing for end-to-end deterministic transmission in TSN.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01878-6
- By:
- Publication type:
- Article
LVCA: An efficient voting-based consensus algorithm in private Blockchain for enhancing data security.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01808-6
- By:
- Publication type:
- Article
Blockchain-based synchronized data transmission with dynamic device management for digital twin in IIoT.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-025-01910-3
- By:
- Publication type:
- Article
IPML-ANP: An integrated polynomial manifold learning model and anchor node placement for wireless sensor node localization.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-025-01908-x
- By:
- Publication type:
- Article
End-to-end supervised learning for NOMA-enabled resource allocation: A dynamic and scalable approach.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01815-7
- By:
- Publication type:
- Article
An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01839-z
- By:
- Publication type:
- Article
MobiPower: Scheduling mobile charging stations for UAV-mounted edge servers in Internet of Vehicles.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-025-01905-0
- By:
- Publication type:
- Article
NHBBWO: A novel hybrid butterfly-beluga whale optimization algorithm with the dynamic strategy for WSN coverage optimization.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01901-w
- By:
- Publication type:
- Article
Distributed denial of service attack detection and mitigation strategy in 5G-enabled internet of things networks with adaptive cascaded gated recurrent unit.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01894-6
- By:
- Publication type:
- Article
Strengthening security in IoT-based smart cities utilizing cycle-consistent generative adversarial networks for attack detection and secure data transmission.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01838-0
- By:
- Publication type:
- Article
Provisioning, authentication, and integrity-preserving communication scheme for Internet of things-enabled devices.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01896-4
- By:
- Publication type:
- Article
QoS-Aware cloud security using lightweight EfficientNet with Adaptive Sparse Bayesian Optimization.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01899-1
- By:
- Publication type:
- Article
Startup delay aware short video ordering: Problem, model, and a reinforcement learning based algorithm.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01898-2
- By:
- Publication type:
- Article
A steganographic backdoor attack scheme on encrypted traffic.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01893-7
- By:
- Publication type:
- Article
IoT-enabled wireless sensor networks optimization based on federated reinforcement learning for enhanced performance.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01887-5
- By:
- Publication type:
- Article
Novel joint data collection and wireless charging algorithm for rechargeable wireless sensor networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01870-0
- By:
- Publication type:
- Article
AIoT-enabled service prioritization for mobile nodes using enhanced PMIPv6 extension protocol.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01844-2
- By:
- Publication type:
- Article
Efficient multi-job federated learning scheduling with fault tolerance.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01847-z
- By:
- Publication type:
- Article
A privacy preserving batch audit scheme for IoT based cloud data storage.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01890-w
- By:
- Publication type:
- Article
Boosted sooty tern and piranhav foraging meta-heuristic optimized cluster head selection-based routing algorithm for extending network lifetime in WSNs.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01880-y
- By:
- Publication type:
- Article
A multi-factor user authentication protocol for the internet of drones environment.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01862-0
- By:
- Publication type:
- Article
An efficient and secured voting system using blockchain and hybrid validation technique with deep learning.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01849-x
- By:
- Publication type:
- Article
Classification of intrusion using Multi-Stream Generative Adversarial Networks in Wireless Sensor Networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01846-0
- By:
- Publication type:
- Article
AAQ-PEKS: An Attribute-based Anti-Quantum Public Key Encryption Scheme with Keyword Search for E-healthcare Scenarios.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01842-4
- By:
- Publication type:
- Article
Deep learning for intrusion detection in IoT networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01819-3
- By:
- Publication type:
- Article
Energy-aware and efficient cluster head selection and routing in wireless sensor networks using improved artificial bee Colony algorithm.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01810-y
- By:
- Publication type:
- Article
A hybrid optimization and machine learning based energy-efficient clustering algorithm with self-diagnosis data fault detection and prediction for WSN-IoT application.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01892-8
- By:
- Publication type:
- Article
Mitigating bias in heterogeneous federated learning via stratified client selection.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01886-6
- By:
- Publication type:
- Article
Enhancing security in electronic health records using an adaptive feature-centric polynomial data security model with blockchain integration.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01883-9
- By:
- Publication type:
- Article
Deduplication-enabled CP-ABE with revocation.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01863-z
- By:
- Publication type:
- Article
Hybrid Termite Queen and Walrus Optimization Algorithm-based energy efficient cluster-based routing with static and mobile sink node in WSNs.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01848-y
- By:
- Publication type:
- Article
Trust-based secure federated learning framework to mitigate internal attacks for intelligent vehicular networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01835-3
- By:
- Publication type:
- Article
Optimized auxiliary physics neural network based multi-target detection for edge-cloud in smart internet of things.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01811-x
- By:
- Publication type:
- Article
A lightweight IoT device identification using enhanced behavioral-based features.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01891-9
- By:
- Publication type:
- Article
BBAD: Blockchain-based data assured deletion and access control system for IoT.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01881-x
- By:
- Publication type:
- Article
SJO-MRL: Energy efficient path selection algorithm for WSNs.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01875-9
- By:
- Publication type:
- Article
An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01867-9
- By:
- Publication type:
- Article
Unified modeling and evaluation of availability and power consumption in the internet of things.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01865-x
- By:
- Publication type:
- Article