Search
Search Results
-
Performance of Ad-Hoc Networks Using Smart Technology Under DDoS Attacks
The networks used in many areas such as location-based services, robotics, smart building assessment, smart water management, smart mobile learning,... -
A Deep Reinforcement Learning-based DDoS Attack Mitigation Scheme for Securing Big Data in Fog-Assisted Cloud Environment
Cloud computing is supported by Fog computing paradigm for achieving local data investigation at edge devices by offering storage support,...
-
An approach to enhance packet classification performance of software-defined network using deep learning
Packet classification in software-defined network has become more important with the rapid growth of Internet. Existing approaches focused on the...
-
An Impact of Different Uncertainties and Attacks on the Performance Metrics and Stability of Industrial Control System
The revolutionized growth in the networked control system has made the system more vulnerable to different types of threats such as delays, packet... -
Novel mixed-triggered filter design for interval type-2 fuzzy nonlinear Markovian jump systems with randomly occurring packet dropouts
This paper is aimed at investigating the problem of mixed-triggered filter design for interval type-2 (IT2) fuzzy nonlinear Markovian jump systems...
-
Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural network
Middle-box based attacks create serious functional defects in the devices such as firewalls, address translators, load balancers, server units, and...
-
Introduction
In this chapter, we first introduce some underlying concepts of network-based control and motion control of unmanned marine vehicles (UMVs). Then we... -
A deep learning-based intrusion detection approach for mobile Ad-hoc network
The goal of the paper is to present a Stacked autoencoder approach for enhancing Intrusion Detection Systems (IDSs) in Mobile Ad-Hoc Networks...
-
Network traffic classification model based on attention mechanism and spatiotemporal features
Traffic classification is widely used in network security and network management. Early studies have mainly focused on map** network traffic to...
-
Optimal LQG Control for Networked Control Systems with Remote and Local Controllers
We consider the finite horizon optimal LQG control problem for networked control systems with a remote controller, a local controller and...
-
Machine learning interpretability meets TLS fingerprinting
Protecting users’ privacy over the Internet is of great importance; however, it becomes harder and harder to maintain due to the increasing...
-
Robust Fault Detection Filter Design for Nonlinear Networked Control Systems with Time-Varying Delays and Packet Dropout
This paper deals with the problem of detecting faults in nonlinear networked control systems. The considered system is the state space models of...
-
Event-Trigger Dynamic State Estimation for Practical WAMS Applications in Smart Grid
This book describes how dynamic state estimation application in wide-area measurement systems (WAMS) are crucial for power system reliability, to...
-
An optimal and secure environment for intrusion detection using hybrid optimization based ResNet 101-C model
A monitoring system that can identify and assess abnormal activity is known as an intrusion detection system (IDS), and it is crucial in protecting...
-
Traffic Pattern Plot: Video Identification in Encrypted Network Traffic
Most of the Internet traffic is encrypted, and the challenge is its ability to recognize the streaming videos from the Internet traffic. In this... -
ARGCN: An intelligent prediction model for SDN network performance
Traditional methods for analyzing network performance have limitations, including high costs and over-simplified assumptions, which are not helpful...
-
Charging Selection Policies for Framed Slotted ALOHA on Wireless Networks with Directional Energy Transfer
The framed slotted ALOHA is a suitable multiple access control (MAC) protocol for machine-type-communication devices due to (i) no initial setup...
-
Deep Learning Approach for Encryption Techniques in Vehicular Networks
Wireless communication technology is advancing at a breakneck speed these days. The notion of the network of vehicles on net, which is a very...
-
Switched Event-Triggered Sliding Mode Control for Connected and Autonomous Vehicles Against Communication Imperfections
This paper investigates an observer-based integral sliding mode control nonlinear connected and autonomous vehicles (CAVs) system with uncertainties,...
-
Stabilization and Optimal Control for Markov Jump Linear System With Two Controllers Over Multiple Erasure Channels
This paper considers the stabilization and optimal control of networked control systems possessing two controllers, in which the local controller and...