We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 1,059 results
  1. Performance of Ad-Hoc Networks Using Smart Technology Under DDoS Attacks

    The networks used in many areas such as location-based services, robotics, smart building assessment, smart water management, smart mobile learning,...
    Aden Ali Said, Muhammet Çakmak, Zafer Albayrak in Innovations in Smart Cities Applications Volume 5
    Conference paper 2022
  2. A Deep Reinforcement Learning-based DDoS Attack Mitigation Scheme for Securing Big Data in Fog-Assisted Cloud Environment

    Cloud computing is supported by Fog computing paradigm for achieving local data investigation at edge devices by offering storage support,...

    Sengathir Janakiraman, M. Deva Priya in Wireless Personal Communications
    Article 26 April 2023
  3. An approach to enhance packet classification performance of software-defined network using deep learning

    Packet classification in software-defined network has become more important with the rapid growth of Internet. Existing approaches focused on the...

    B. Indira, K. Valarmathi, D. Devaraj in Soft Computing
    Article 10 April 2019
  4. An Impact of Different Uncertainties and Attacks on the Performance Metrics and Stability of Industrial Control System

    The revolutionized growth in the networked control system has made the system more vulnerable to different types of threats such as delays, packet...
    Brijraj Singh Solanki, Renu Kumawat, Seshadhri Srinivasan in Communication and Intelligent Systems
    Conference paper 2021
  5. Novel mixed-triggered filter design for interval type-2 fuzzy nonlinear Markovian jump systems with randomly occurring packet dropouts

    This paper is aimed at investigating the problem of mixed-triggered filter design for interval type-2 (IT2) fuzzy nonlinear Markovian jump systems...

    Zhongda Lu, Guangtao Ran, ... Junxiao Lu in Nonlinear Dynamics
    Article 26 June 2019
  6. Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural network

    Middle-box based attacks create serious functional defects in the devices such as firewalls, address translators, load balancers, server units, and...

    Harun Bangali, Paul Rodrigues, ... A. Kannan in Wireless Networks
    Article 15 December 2023
  7. Introduction

    In this chapter, we first introduce some underlying concepts of network-based control and motion control of unmanned marine vehicles (UMVs). Then we...
    Yu-Long Wang, Qing-Long Han, ... Lang Ma in Network-Based Control of Unmanned Marine Vehicles
    Chapter 2023
  8. A deep learning-based intrusion detection approach for mobile Ad-hoc network

    The goal of the paper is to present a Stacked autoencoder approach for enhancing Intrusion Detection Systems (IDSs) in Mobile Ad-Hoc Networks...

    Rahma Meddeb, Farah Jemili, ... Ouajdi Korbaa in Soft Computing
    Article 21 May 2023
  9. Network traffic classification model based on attention mechanism and spatiotemporal features

    Traffic classification is widely used in network security and network management. Early studies have mainly focused on map** network traffic to...

    Feifei Hu, Situo Zhang, ... Yanqi Song in EURASIP Journal on Information Security
    Article Open access 12 July 2023
  10. Optimal LQG Control for Networked Control Systems with Remote and Local Controllers

    We consider the finite horizon optimal LQG control problem for networked control systems with a remote controller, a local controller and...

    **ao Liang, Juanjuan Xu, ... Rong Gao in International Journal of Control, Automation and Systems
    Article 28 November 2019
  11. Machine learning interpretability meets TLS fingerprinting

    Protecting users’ privacy over the Internet is of great importance; however, it becomes harder and harder to maintain due to the increasing...

    Mahdi Jafari Siavoshani, Amirhossein Khajehpour, ... Ali Taheri in Soft Computing
    Article 28 March 2023
  12. Robust Fault Detection Filter Design for Nonlinear Networked Control Systems with Time-Varying Delays and Packet Dropout

    This paper deals with the problem of detecting faults in nonlinear networked control systems. The considered system is the state space models of...

    Hossein Kargar, Jafar Zarei, Roozbeh Razavi-Far in Circuits, Systems, and Signal Processing
    Article 11 June 2018
  13. Event-Trigger Dynamic State Estimation for Practical WAMS Applications in Smart Grid

    This book describes how dynamic state estimation application in wide-area measurement systems (WAMS) are crucial for power system reliability, to...

    Zhen Li, Sen Li, ... ** Chen
    Book 2020
  14. An optimal and secure environment for intrusion detection using hybrid optimization based ResNet 101-C model

    A monitoring system that can identify and assess abnormal activity is known as an intrusion detection system (IDS), and it is crucial in protecting...

    S. Nikkath Bushra, Nalini Subramanian, A. Chandrasekar in Peer-to-Peer Networking and Applications
    Article 24 July 2023
  15. Traffic Pattern Plot: Video Identification in Encrypted Network Traffic

    Most of the Internet traffic is encrypted, and the challenge is its ability to recognize the streaming videos from the Internet traffic. In this...
    Ali S. Kamal, Syed M. A. H. Bukhari, ... Muhammad A. B. Fayyaz in Intelligent Sustainable Systems
    Conference paper 2023
  16. ARGCN: An intelligent prediction model for SDN network performance

    Traditional methods for analyzing network performance have limitations, including high costs and over-simplified assumptions, which are not helpful...

    Bo Ma, Qin Lu, ... Chuanhuang Li in Peer-to-Peer Networking and Applications
    Article 22 February 2024
  17. Charging Selection Policies for Framed Slotted ALOHA on Wireless Networks with Directional Energy Transfer

    The framed slotted ALOHA is a suitable multiple access control (MAC) protocol for machine-type-communication devices due to (i) no initial setup...

    Ying-Jen Lin, Show-Shiow Tzeng in Wireless Personal Communications
    Article 01 January 2024
  18. Deep Learning Approach for Encryption Techniques in Vehicular Networks

    Wireless communication technology is advancing at a breakneck speed these days. The notion of the network of vehicles on net, which is a very...

    Deepak Choudhary, Roop Pahuja in Wireless Personal Communications
    Article 23 February 2022
  19. Switched Event-Triggered Sliding Mode Control for Connected and Autonomous Vehicles Against Communication Imperfections

    This paper investigates an observer-based integral sliding mode control nonlinear connected and autonomous vehicles (CAVs) system with uncertainties,...

    Article 08 September 2022
  20. Stabilization and Optimal Control for Markov Jump Linear System With Two Controllers Over Multiple Erasure Channels

    This paper considers the stabilization and optimal control of networked control systems possessing two controllers, in which the local controller and...

    Xueyang Li, Chunyan Han, ... Wei Wang in International Journal of Control, Automation and Systems
    Article 03 January 2024
Did you find what you were looking for? Share feedback.