Search
Now showing items 51-60 of 281
Threat-specific security risk evaluation in the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
ANFIS-Net for automatic detection of COVID-19
(
Nature Research
, 2021 , Article)
Among the most leading causes of mortality across the globe are infectious diseases which have cost tremendous lives with the latest being coronavirus (COVID-19) that has become the most recent challenging issue. The extreme ...
Time-Dependent Pricing for Bandwidth Slicing under Information Asymmetry and Price Discrimination
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to the bursty nature of Internet traffic, network service providers (NSPs) are forced to expand their network capacity in order to meet the ever-increasing peak-time traffic demand, which is however costly and inefficient. ...
Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
The incorporation of advanced networking technologies makes modern systems vulnerable to cyber-attacks that can result in a number of harmful outcomes. Due to the increase of security incidents and massive activities on ...
Collaborative hierarchical caching and transcoding in edge network with CE-D2D communication
(
Academic Press
, 2020 , Article)
To support multimedia applications, Mobile Edge Computing (MEC) servers offer storage and computing capacities to handle videos close to end-users. However, the high load in peak hours consumes the limited available bandwidth ...
An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning
(
Springer
, 2020 , Article)
Opportunistic communications as an efficient traffic offloading method can be used to offload uplink traffic of cellular networks to Wi-Fi networks. However, because of its contact pattern (contact frequency and contact ...
An SDN Architecture for AUV-Based Underwater Wireless Networks to Enable Cooperative Underwater Search
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
With the emergence of new underwater ICTs, UWNs based on AUV have become the mainstream technology for underwater search tasks. These advanced underwater searching technologies are leading to smart perceptual ocean ...
Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary technologies to prompt smart manufacturing and increase productivity. With manufacturing being more complicated and sophisticated, ...
DAGIoV: A Framework for Vehicle to Vehicle Communication Using Directed Acyclic Graph and Game Theory
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Data sharing and content offloading among vehicles is an imperative part of the Internet of Vehicles (IoV). A peer-to-peer connection among vehicles in a distributed manner is a highly promising solution for fast communication ...
A load-adaptive fair access protocol for MAC in underwater acoustic sensor networks
(
Academic Press
, 2021 , Article)
To address time unfairness access problems in the dynamic channel, an underwater adaptive contention window (CW) adjustment backoff algorithm (QL-UACW) based on Q-learning is presented in this paper. That algorithm employs ...