We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. IoT Data Stream Handling, Analysis, Communication and Security Issues: A Systematic Survey

    Massive data management or data stream handling has become a prominent study topic as a result of recent breakthroughs in the Internet of Things...

    Sanjay Patidar, Neetesh Kumar, Rajni **dal in Wireless Personal Communications
    Article 20 May 2024
  2. Smart Cities and Transportation Based Vehicle-To-Vehicle Communication and Cyber Security Analysis Using Machine Learning Model in 6G Network

    Increasing number of sensor-centric communication and computer equipment installed inside cars for various purposes, such as vehicle monitoring,...

    Shurui Kong, Kemeng Wang, ... Junjie Wang in Wireless Personal Communications
    Article 01 June 2024
  3. B-Tor: Anonymous communication system based on consortium blockchain

    The rapid development of the Internet has led to the increasingly prominent feature of openness and transparency of user information. Tor, which is...

    Dawei Xu, Jiaqi Gao, ... Jian Zhao in Peer-to-Peer Networking and Applications
    Article 12 July 2023
  4. IoT Crypto Security Communication System

    There are several uses for the Internet of Things networks, which link many devices. Massive volumes of sensitive data are collected and processed by...
    Kiran Kumar Kommineni, G. C. Madhu, ... Gurpreet Singh in IoT Based Control Networks and Intelligent Systems
    Conference paper 2023
  5. Wireless 6G Cloud Communication Based Security Analysis Using Machine Learning in Internet of Medical Things (IoMT)

    In order to safeguard confidentiality of patient data, healthcare data should not be made available to unauthorized individuals. By 2030, the...

    Jicheng Chen, Yihan Xu, ... Rui Han in Wireless Personal Communications
    Article 15 May 2024
  6. Unintended Data Behaviour Analysis Using Cryptography Stealth Approach Against Security and Communication Network

    Data security is based on the collection of data and storage without hacking from a third person has been proposed. While transmitting the data, the...

    Mohammad Alauthman, Hanan Aljuaid, ... Awais Khan Jumani in Mobile Networks and Applications
    Article 21 August 2023
  7. Socio Cyber-Physical System for Cyber-Attack Detection in Brand Marketing Communication Network

    Brand truthfulness, consumer trust, and economic security are all seriously dangerous from sophisticated cyberattacks targeting brand communication...

    SiFan Yang, Haiming Long in Wireless Personal Communications
    Article 18 June 2024
  8. A Novel Hybrid Communication Policy Using Network Coding Based Post-Quantum Cryptography and Adaptive Neuro Fuzzy Inference System

    This paper presents a novel hybrid communication policy developed using Hybrid Universal Network Coding Cryptosystem (HUNCC), which can perform...

    Rohit Goyal, Arnav Pawar, ... Sainath Bitragunta in Wireless Personal Communications
    Article 03 February 2024
  9. A Hybrid Security Scheme for Inter-vehicle Communication in Content Centric Vehicular Networks

    Content centric networking is one of the emerging paradigm for inter-vehicle communication that focuses on the contents being shared within the...

    Righa Tandon, P. K. Gupta in Wireless Personal Communications
    Article 17 February 2023
  10. Security Analysis of Drone Communication Methods

    The use of drones in various applications has increased significantly in recent years, including agriculture, transportation, and military...
    Conference paper 2024
  11. Improved Security of the Data Communication in VANET Environment Using ASCII-ECC Algorithm

    Now-a-days, with the augmenting accident statistics, the Vehicular Ad-hoc Networks (VANET) are turning out to be more popular, hel** in prevention...

    S. Sa**i, E. A. Mary Anita, J. Janet in Wireless Personal Communications
    Article 05 October 2022
  12. SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework

    The rapid expansion of Cyber-Physical Systems (CPS) is crucial for enhancing connectivity in the smart world. Encompassing smart homes, cities,...

    S. Ramya, Manivannan Doraipandian, Rengarajan Amirtharajan in Peer-to-Peer Networking and Applications
    Article 01 June 2024
  13. Risk Prediction Techniques for Power Control System Network Security

    As a fundamental energy infrastructure, the power system has a direct impact on people’s daily lives and production. If the security of the...

    Article 18 April 2024
  14. An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques

    Effective communication between smart transportation and smart vehicles is carried out using Vehicular Ad-Hoc Networks (VANETs). Here, the VANET...

    M. S. Minu, P. Jona Innisai Rani, ... A. Rajesh in Peer-to-Peer Networking and Applications
    Article 18 April 2024
  15. Block chain espoused adaptive multi-scale dual attention network with quaternion fractional order meixner moments encryption for cyber security in wireless communication network

    Autonomous driving like subsequent generation cyber-physical system (CPS) with present improvement of wireless communication network, here is a...

    S. Soundararajan, B. Nithya, ... T. Vignesh in Wireless Networks
    Article 21 February 2024
  16. Logistics Security Integrated Communication System Under the Background of 5G Artificial Intelligence

    This paper designed the integrated communication system of logistics support security under the background of 5G artificial intelligence. In view of...
    Conference paper 2024
  17. Design of Intelligent Software Security System Based on Spark Big Data Computing

    With the rapid development of computer science and technology, the Internet has penetrated into various fields of society and economy. However, there...

    Chong Xu, **g Li in Wireless Personal Communications
    Article 16 April 2024
  18. 6G Wireless Communication Cyber Physical System Based Smart Healthcare Using Quantum Optimization with Machine Learning

    The ground-breaking paradigm of artificial intelligence (AI) will provide universal access to sixth generation (6G) edge computing-based...

    Hemalatha Thanganadar, Syed Mufassir Yaseen, ... P. Vijayakumar in Wireless Personal Communications
    Article 18 June 2024
  19. Security Evaluation of Power Communication System Based on SSE-CMM

    SSE-CMM is a method to measure the practical ability of safety engineering. Its goal is to develop safety engineering into a set of meaningful,...
    Hongzhang **ong, **aokun Yang in Frontier Computing
    Conference paper 2023
  20. An Interactive Visualization System for Network Security Data

    Data visualization is an important approach for data analysis, which can reveal the patterns and characteristics of complex datasets through visual...

    Li Zheng, Gang Yu, Yuntian Zheng in Journal of Signal Processing Systems
    Article 31 January 2023
Did you find what you were looking for? Share feedback.