We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 2,351 results
  1. Detection and prevention of DDoS attacks on edge computing of IoT devices through reinforcement learning

    The limited resource and computation capacity of an IoT device always being a target vector for intruders to use to steal sensitive data from the...

    Anit Kumar, Dhanpratap Singh in International Journal of Information Technology
    Article 28 November 2023
  2. Design and Analysis of Energy Efficient Service Discovery Routing Protocol in MANETs

    Wireless sensor network (WSN) enables physical environment tracking and creation of timely action based on sensor data. The primary goal of this type...

    Bhawana Sharma, Deepika Saxena in SN Computer Science
    Article 28 June 2023
  3. Impact of Scalability on BSM PDR Messages in VANETs

    Vehicular Ad-hoc Networks (VANET) has been considered as the prospective techniques for improving safety and providing other services to drivers and...
    Satveer Kour, Butta Singh, ... Himali Sarangal in Advancements in Smart Computing and Information Security
    Conference paper 2024
  4. A comprehensive study on energy-efficient-based routing protocols in the Internet of things Part I: definition and classification

    The Internet of things (IoT) rapidly grew, and numerous services, programs, sensor-equipped electronics, and related protocols were created and are...

    Noor Raad Saadallah, Salah Abdulghani Alabady in Iran Journal of Computer Science
    Article 24 April 2024
  5. A soft computing based novel hybrid optimization algorithm H3PGAB3C and its application to routing in WMNs

    This paper proposes a novel hybridized optimization algorithm namely H3PGAB3C. This algorithm is a combination of the three-parent genetic algorithm...

    Rattan Deep Aneja, Amit Kumar Bindal, Shakti Kumar in International Journal of Information Technology
    Article 22 June 2022
  6. Enhance data availability and network consistency using artificial neural network for IoT

    IoT networks have become famous and utilized in many industries such as agriculture, medical, manufacture, and others due to their efficiency and...

    Mujahid Tabassum, Sundresan Perumal, ... Amith Khandakar in Multimedia Tools and Applications
    Article 21 June 2022
  7. Awareness routing algorithm in vehicular ad-hoc networks (VANETs)

    The behavior of a Vehicle Ad hoc Network (VANETs) is extremely unpredictable due to the high mobility and random network topology inherent to the...

    Deepak choudhary, Roop Pahuja in Journal of Big Data
    Article Open access 24 July 2023
  8. Performance evaluation of cluster-based federated machine learning

    Federated Learning (FL) is a collaborative training method for machine learning (ML) that aggregates model weights from multiple participants during...

    Karim Asif Sattar, Uthman Baroudi in Neural Computing and Applications
    Article 19 February 2024
  9. 3Dimensional improvise clustering algorithm for unmanned aerial vehicles: 3DICA

    A Flying Ad-hoc Network (FANET) is a group of Unmanned Aerial Vehicles (UAVs) that operate in an ad-hoc fashion, like Mobile Ad-hoc networks (MANET)...

    Vinti Gupta, Dambarudhar Seth in International Journal of Information Technology
    Article 29 February 2024
  10. An Adaptive Clustering Approach for Efficient Data Dissemination in IoV

    Due to the inherent characteristics of Vehicular Ad-hoc Networks (VANETs), such as uneven distribution and high mobility, establishing and...
    Conference paper 2023
  11. Securing the MANET by Detecting the Flooding Attacks Using Hybrid CNN-Bi-LSTM-RF Model

    Security in Mobile Ad Hoc Networks (MANETs) is complicated by attacks such request route flooding, which are simple to launch but hard to defend...
    B. Deena Divya Nayomi, L. Venkata Jayanth, ... L. Shashi Vardhan in Mining Intelligence and Knowledge Exploration
    Conference paper 2023
  12. Anomaly Detection in MANET Using Zone Based AODV Routing Protocol

    Intrusion Detection System (IDS) is a famous approach for finding attacks in anomalies. This system is used for monitoring the attacks happening in...
    G. S. Prasanna Lakshmi, Shantakumar B. Patil, Premjyothi Patil in Advanced Informatics for Computing Research
    Conference paper 2019
  13. R-RPT-A Reliable Routing Protocol for Industrial Wireless Sensor Networks

    Wireless Sensor Networks (WSN) are extensively used to monitor and control physical environments. Effective energy management and maintaining...
    Conference paper 2024
  14. Mitigation of black hole attacks using firefly and artificial neural network

    In Mobile Ad hoc Network (MANET), network topology changes as devices/users/nodes move and nodes can serve as a source, destination, or router for...

    Pooja Rani, Kavita, ... Sonali Dash in Neural Computing and Applications
    Article 07 February 2022
  15. Efficient Backbone Routing in Hierarchical MANETs

    Hierarchical network architectures are widely deployed to reduce routing overheads and increase scalability. In our work, we are interested in...
    Thomas Kunz in Ad Hoc Networks
    Conference paper 2021
  16. Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology

    Abstract

    This work is devoted to the study and systematization of cyber threats to large-scale cyber-physical systems (CPSs) with a dynamic network...

    Article 01 December 2022
  17. Enhanced security using multiple paths routine scheme in cloud-MANETs

    Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices....

    Tao Hai, **cheng Zhou, ... Cresantus Biamba in Journal of Cloud Computing
    Article Open access 29 April 2023
  18. An Energy-Efficient Hybrid Hierarchical Clustering Algorithm for Wireless Sensor Devices in IoT

    An advancement made in wireless technologies has developed a greater impact over the Internet of Things (IoT) systems. Clustering is one of the...
    Nitesh Chouhan, S. C. Jain in Advances in Computing and Data Sciences
    Conference paper 2021
  19. An Optimal Algorithm Based on Fairness of Resource Allocation in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are popular due to their adaptability, easy-setup, and transmission efficiency, etc. The fair multiple concurrent flows...
    Jiadong Peng, Zhanmao Cao in Theoretical Computer Science
    Conference paper 2024
Did you find what you were looking for? Share feedback.