We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 1,631 results
  1. Fault diagnosis of belt conveyor idlers based on gradient boosting decision tree

    Maintenance planning and control should prioritize predictive techniques (e.g., vibration analysis on critical components such as belt conveyors and...

    João L. L. Soares, Thiago B. Costa, ... Danilo S. Braga in The International Journal of Advanced Manufacturing Technology
    Article 11 April 2024
  2. Malicious Node Detection in Heterogeneous Internet of Things

    In recent years, security has been gaining popularity in resource-constrained IoT ecosystems as it has less capability to run conventional encryption...
    Supriya Goel, Somya, ... Priyanka Mekala in Advanced IoT Sensors, Networks and Systems
    Conference paper 2023
  3. Knowledge Representation to Support Partially Automated Honeypot Analysis Based on Wireshark Packet Capture Files

    The automation of packet analysis, even partially, is very much desired, because packet analysis is time-consuming and requires technical knowledge...
    Conference paper 2020
  4. Elephant flow detection intelligence for software-defined networks: a survey on current techniques and future direction

    Software-defined networking (SDN) is characterized by the separation of the packet forwarding plane from the network control plane. This separation...

    Mosab Hamdan, Hashim Elshafie, ... M. N. Marsono in Evolutionary Intelligence
    Article 07 February 2024
  5. Cross-Technology Interference Mitigation for Wearable Devices

    With the vigorous evolution of the Internet of things (IoT) technologies, the IoT applications blossom everywhere. Notably, the rapidly aging society...
    Conference paper 2023
  6. Analysis and Rendering of Deauthentication Attack Using IoT Technology

    The Internet has developed exponentially over the years and has become an identity. Along with development, different kinds of networks such as LAN,...
    Conference paper 2023
  7. NITSDN: Development of SDN Dataset for ML-Based Intrusion Detection System

    Decision for the routing of traffic and packet forwarding is done by the embedded layers at the traditional distributed networks. Due to the embedded...
    Bipal Khanal, Chandan Kumar, Md. Sarfaraj Alam Ansari in Advanced Computational and Communication Paradigms
    Conference paper 2023
  8. Deployment of Deep Learning Networks

    The surge on the Internet and data has led to advanced deep learning systems and hence the book also presents techniques for Internet of Things (IoT)...
    Jayakumar Singaram, S. S. Iyengar, Azad M. Madni in Deep Learning Networks
    Chapter 2024
  9. Optimal Feature Selection to Improve Vehicular Network Lifetime

    The evolution of the Internet of Things (IoT) leads to the ascent of the need to develop a protocol for Low power and Lossy Networks (LLNs). The IETF...
    Sakshi Garg, Deepti Mehrotra, ... Hari Mohan Pandey in International Conference on Cyber Security, Privacy and Networking (ICSPN 2022)
    Conference paper 2023
  10. Design of Dual-Stack, Tunneling, and Translation Approaches for Blockchain-IPv6

    The most current edition of the Internet protocol is IPv6 (IP). Because once compared to IPv4 and IPv6 has a series of benefits of more efficient...
    Srihari Varma Mantena, S. Jayasundar, ... Rajasekar Rangasam in Intelligent Systems and Sustainable Computing
    Conference paper 2022
  11. An Effective Scheme to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    MANET refers to a mobile ad hoc network, which is self-configured without having a fixed base. It has been used in various fields for various...
    Mukul Shukla, Brijendra Kumar Joshi in Edge Analytics
    Conference paper 2022
  12. Enhancement of Network Security Through Intrusion Detection

    Security has become the greatest issue, both within and outside the organizations which are on cloud. The use of user IDs, passwords, and firewalls...
    Sameena Naaz, Khushboo Mir, Iffat Rehman Ansari in Soft Computing for Security Applications
    Conference paper 2022
  13. Network Packet Analysis in Real Time Traffic and Study of Snort IDS During the Variants of DoS Attacks

    This paper discusses the functionality of port scanning techniques used for accessing the IP addresses of vulnerable hosts present in the network....
    Nilesh Kunhare, Ritu Tiwari, Joydip Dhar in Hybrid Intelligent Systems
    Conference paper 2021
  14. Tool wear status monitoring under laser-ultrasonic compound cutting based on acoustic emission and deep learning

    In order to solve the problem of untimely monitoring of tool wear status during laser-ultrasonic compound cutting (LUCC), which leads to the...

    Changjuan Zhang, Junhao Wang, ... Feng Jiao in Journal of Mechanical Science and Technology
    Article 03 May 2024
  15. Enhancing RPL using E-MOF: a fuzzy-based mobility model for IoV

    Routing Protocol (RPL) is treated as a standard protocol for Low power and Lossy Networks (LLNs). It was introduced by the Internet Engineering Task...

    Sakshi Garg, Deepti Mehrotra, ... Sujata Pandey in Peer-to-Peer Networking and Applications
    Article 03 September 2022
  16. ABAP: Anchor Node Based DDoS Attack Detection Using Adaptive Neuro-Fuzzy Inference System

    Wireless Sensor Network is utilized in many applications so it is prone to various attacks. Among which the flooding attacks interrupt the...

    P. J. Beslin Pajila, E. Golden Julie, Y. Harold Robinson in Wireless Personal Communications
    Article 13 September 2022
  17. Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-Middle

    In the scenario of a 4G man-in-the-middle attack, the analysis of encrypted traffic is a highly complex problem. The attack based on 4G...
    Menglin Ma, Baojiang Cui in Advances in Internet, Data & Web Technologies
    Conference paper 2024
  18. An Efficient Delay Aware Emergency Message Dissemination and Data Retrieval in Secure VANET-Cloud Environment

    Over the recent decades, incorporating Vehicular Ad-hoc Network (VANET) into Cloud computing plays a vital role, since it provides a reliable safety...

    Article 19 June 2023
  19. Practical cross-layer testing of HARQ-induced delay variation on IP/RTP QoS and VoLTE QoE

    As the PHY/MAC-layer IR-HARQ and RLC-layer ARQ error recovery procedures, adopted in LTE, may impose additional delay when their code-block...

    Adriana Lipovac, Vlatko Lipovac, ... Ines Obradović in EURASIP Journal on Wireless Communications and Networking
    Article Open access 07 April 2021
  20. Prediction of characteristic blast-induced vibration frequency during underground excavation by using wavelet transform

    Blast-induced vibration produces a very complex signal, and it is very important to work out environmental problems induced by blasting. In this...

    Tae Un Pak, Guk Rae Jo, Un Chol Han in Frontiers of Structural and Civil Engineering
    Article 01 August 2022
Did you find what you were looking for? Share feedback.