تصفح Network & Distributed Systems حسب العنوان
السجلات المعروضة 36 -- 55 من 70
-
Machine learning for the security of healthcare systems based on Internet of Things and edge computing
( Elsevier , 2022 , Book chapter)Using the Internet of Medical Things (IoMT) for treatment and diagnosis has exponentially grown due to its diverse use cases and efficient planning with defined resources. IoMT in the e-healthcare system enables continuous ... -
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
( Elsevier , 2024 , Article)Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use of mobile devices. Exploiting vulnerabilities from devices as well as ... -
Minimizing energy consumption of IoT devices for O-RAN based IoT systems
( Elsevier , 2023 , Article)The implementation of Open Radio Access Network (O-RAN) architecture in Internet of Things (IoT) systems has garnered significant attention as a means to fulfill the stringent requirements of ultra-low latency and ultra-low ... -
Minimum Variance Embedded Random Vector Functional Link Network with Privileged Information
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)A teacher in a school plays significant role in classroom while teaching the students. Similarly, learning via privileged information (LUPI) gives extra information generated by a teacher to 'teach' the learning algorithm ... -
Multi-moth flame optimization for solving the link prediction problem in complex networks
( Springer Verlag , 2019 , Article)Providing a solution for the link prediction problem attracts several computer science fields and becomes a popular challenge in researches. This challenge is presented by introducing several approaches keen to provide the ... -
Oblique and rotation double random forest
( Elsevier Ltd , 2022 , Article)Random Forest is an ensemble of decision trees based on the bagging and random subspace concepts. As suggested by Breiman, the strength of unstable learners and the diversity among them are the ensemble models’ core strength. ... -
Policy specification and verification for blockchain and smart contracts in 5G networks
( Korean Institute of Communications Information Sciences , 2020 , Article)Blockchain offers unprecedented opportunities for innovation in financial transactions. A whole new world of opportunities for banking, lending, insurance, money transfer, investments, and stock markets awaits. However, ... -
Preface
( Institute of Physics , 2022 , Other)2022 2nd International Conference on Electron Devices and Applications was held virtually during May 13-15, 2022 via Zoom platform due to the pandemic of COVID-19. With a satisfactory ending of ICEDA 2021, ICEDA 2022 has ... -
A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks
( Elsevier Ltd , 2022 , Article)Machine Type Communication (MTC) has been emerging for a wide range of applications and services for the Internet of Things (IoT). In some scenarios, a large group of MTC devices (MTCDs) may enter the communication coverage ... -
PriviPK: Certificate-less and secure email communication
( Elsevier Ltd , 2017 , Article)We introduce PriviPK, an infrastructure that is based on a novel combination of certificateless (CL) cryptography and key transparency techniques to enable e2e email encryption. Our design avoids (1) key escrow and deployment ... -
Quantifying Satisfaction of Security Requirements of Cloud Software Systems
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction ... -
Random vector functional link neural network based ensemble deep learning for short-term load forecasting
( Elsevier Ltd , 2022 , Article)Electric load forecasting is essential for the planning and maintenance of power systems. However, its un-stationary and non-linear properties impose significant difficulties in predicting future demand. This paper proposes ... -
Real-time cooperative data routing and scheduling in software defined vehicular networks
( Elsevier B.V. , 2022 , Article)Links in vehicular networks are highly dynamic and generally exist only for a limited amount of time. Moreover, data packets are generally transmitted over multiple hops and have diverse latency requirements. The above ... -
Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to reshape many networking applications. Healthcare ... -
Representation learning using deep random vector functional link networks for clustering: Representation learning using deep RVFL for clustering
( Elsevier Ltd , 2022 , Article)Random Vector Functional Link (RVFL) Networks have received a lot of attention due to the fast training speed as the non-iterative solution characteristic. Currently, the main research direction of RVFLs has supervised ... -
Sample-Based Data Augmentation Based on Electroencephalogram Intrinsic Characteristics
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Deep learning for electroencephalogram-based classification is confronted with data scarcity, due to the time-consuming and expensive data collection procedure. Data augmentation has been shown as an effective way to improve ... -
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
( Elsevier B.V. , 2021 , Article)Data security is a challenge for end-users of cloud services as the users have no control over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider can obtain the end-users’ data. ... -
Secure smart contract-enabled control of battery energy storage systems against cyber-attacks
( Elsevier B.V. , 2019 , Article)Battery Energy Storage Systems (BESSs) are an integral part of a sustainable and resilient smart grid. The security of such critical cyber-physical infrastructure is considered as a major priority for both industry and ... -
Secure Vehicular Platoon Management against Sybil Attacks
( MDPI , 2022 , Article)The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have ... -
Security concerns on machine learning solutions for 6G networks in mmWave beam prediction
( Elsevier B.V. , 2022 , Article)6G – sixth generation – is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning (ML) algorithms have been applied widely in various fields, such ...