Search
Search Results
-
Fault diagnosis of belt conveyor idlers based on gradient boosting decision tree
Maintenance planning and control should prioritize predictive techniques (e.g., vibration analysis on critical components such as belt conveyors and...
-
Malicious Node Detection in Heterogeneous Internet of Things
In recent years, security has been gaining popularity in resource-constrained IoT ecosystems as it has less capability to run conventional encryption... -
Knowledge Representation to Support Partially Automated Honeypot Analysis Based on Wireshark Packet Capture Files
The automation of packet analysis, even partially, is very much desired, because packet analysis is time-consuming and requires technical knowledge... -
Elephant flow detection intelligence for software-defined networks: a survey on current techniques and future direction
Software-defined networking (SDN) is characterized by the separation of the packet forwarding plane from the network control plane. This separation...
-
Cross-Technology Interference Mitigation for Wearable Devices
With the vigorous evolution of the Internet of things (IoT) technologies, the IoT applications blossom everywhere. Notably, the rapidly aging society... -
Analysis and Rendering of Deauthentication Attack Using IoT Technology
The Internet has developed exponentially over the years and has become an identity. Along with development, different kinds of networks such as LAN,... -
NITSDN: Development of SDN Dataset for ML-Based Intrusion Detection System
Decision for the routing of traffic and packet forwarding is done by the embedded layers at the traditional distributed networks. Due to the embedded... -
Deployment of Deep Learning Networks
The surge on the Internet and data has led to advanced deep learning systems and hence the book also presents techniques for Internet of Things (IoT)... -
Optimal Feature Selection to Improve Vehicular Network Lifetime
The evolution of the Internet of Things (IoT) leads to the ascent of the need to develop a protocol for Low power and Lossy Networks (LLNs). The IETF... -
Design of Dual-Stack, Tunneling, and Translation Approaches for Blockchain-IPv6
The most current edition of the Internet protocol is IPv6 (IP). Because once compared to IPv4 and IPv6 has a series of benefits of more efficient... -
An Effective Scheme to Mitigate Blackhole Attack in Mobile Ad Hoc Networks
MANET refers to a mobile ad hoc network, which is self-configured without having a fixed base. It has been used in various fields for various... -
Enhancement of Network Security Through Intrusion Detection
Security has become the greatest issue, both within and outside the organizations which are on cloud. The use of user IDs, passwords, and firewalls... -
Network Packet Analysis in Real Time Traffic and Study of Snort IDS During the Variants of DoS Attacks
This paper discusses the functionality of port scanning techniques used for accessing the IP addresses of vulnerable hosts present in the network.... -
Tool wear status monitoring under laser-ultrasonic compound cutting based on acoustic emission and deep learning
In order to solve the problem of untimely monitoring of tool wear status during laser-ultrasonic compound cutting (LUCC), which leads to the...
-
Enhancing RPL using E-MOF: a fuzzy-based mobility model for IoV
Routing Protocol (RPL) is treated as a standard protocol for Low power and Lossy Networks (LLNs). It was introduced by the Internet Engineering Task...
-
ABAP: Anchor Node Based DDoS Attack Detection Using Adaptive Neuro-Fuzzy Inference System
Wireless Sensor Network is utilized in many applications so it is prone to various attacks. Among which the flooding attacks interrupt the...
-
Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-Middle
In the scenario of a 4G man-in-the-middle attack, the analysis of encrypted traffic is a highly complex problem. The attack based on 4G... -
An Efficient Delay Aware Emergency Message Dissemination and Data Retrieval in Secure VANET-Cloud Environment
Over the recent decades, incorporating Vehicular Ad-hoc Network (VANET) into Cloud computing plays a vital role, since it provides a reliable safety...
-
Practical cross-layer testing of HARQ-induced delay variation on IP/RTP QoS and VoLTE QoE
As the PHY/MAC-layer IR-HARQ and RLC-layer ARQ error recovery procedures, adopted in LTE, may impose additional delay when their code-block...
-
Prediction of characteristic blast-induced vibration frequency during underground excavation by using wavelet transform
Blast-induced vibration produces a very complex signal, and it is very important to work out environmental problems induced by blasting. In this...