A comprehensive review on the users' identity privacy for 5G networks
Fifth Generation (5G) is the final generation in mobile communications, with minimum
latency, high data throughput, and extra coverage. The 5G network must guarantee very …
latency, high data throughput, and extra coverage. The 5G network must guarantee very …
Internet of Things‐Based Smart Electricity Monitoring and Control System Using Usage Data
In everyday life, electricity is necessary, and proper use is critical. To strengthen home
electricity control, the existing systems have been examined over the years. However, the …
electricity control, the existing systems have been examined over the years. However, the …
Composite reliability impacts of synchrophasor-based DTR and SIPS cyber–physical systems
B Jimada-Ojuolape, J Teh - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
The integration of smart infrastructures that facilitate two-way communication via information
and communication technology (ICT) has enhanced the efficiency and sustainability of the …
and communication technology (ICT) has enhanced the efficiency and sustainability of the …
A conceptual and systematics for intelligent power management system-based cloud computing: Prospects, and challenges
This review describes a cloud-based intelligent power management system that uses
analytics as a control signal and processes balance achievement pointer, and describes …
analytics as a control signal and processes balance achievement pointer, and describes …
[HTML][HTML] An optimized link state routing protocol for real-time application over vehicular ad-hoc network
MEM Dafalla, RA Mokhtar, RA Saeed… - Alexandria Engineering …, 2022 - Elsevier
Abstract Voice over Internet Protocol (VoIP) provides good services through Vehicular Ad-
hoc Networks (VANET) platform. These networks encounter various challenges to support …
hoc Networks (VANET) platform. These networks encounter various challenges to support …
Detect phishing website by fuzzy multi-criteria decision making
Phishing activity is undertaken by the hackers to compromise the computer networks and
financial system. A compromised computer system or network provides data and or …
financial system. A compromised computer system or network provides data and or …
Fischer linear discrimination and quadratic discrimination analysis–based data mining technique for internet of things framework for healthcare
TM Ghazal - Frontiers in Public Health, 2021 - research.skylineuniversity.ac.ae
The internet of reality or augmented reality has been considered a breakthrough and an
outstanding critical mutation with an emphasis on data mining leading to dismantling of …
outstanding critical mutation with an emphasis on data mining leading to dismantling of …
Securing Internet of Things devices against code tampering attacks using Return Oriented Programming
Code tampering is serious issue in Internet of Things (IOT). IoT devices are used to collect
environment data like temperature value, light intensity, hart pulse etc. Once an IoT device …
environment data like temperature value, light intensity, hart pulse etc. Once an IoT device …
Energy-efficient fuzzy management system for internet of things connected vehicular ad hoc networks
Many algorithms use clustering to improve vehicular ad hoc network performance. The
expected points of many of these approaches support multiple rounds of data to the …
expected points of many of these approaches support multiple rounds of data to the …
The rise of ransomware: A review of attacks, detection techniques, and future challenges
S Kamil, HSAS Norul, A Firdaus… - … on Business Analytics …, 2022 - ieeexplore.ieee.org
Cybersecurity is important in the field of information technology. One most recent pressing
issue is information security. When we think of cybersecurity, the first thing that comes to …
issue is information security. When we think of cybersecurity, the first thing that comes to …