Internet of drones security: Taxonomies, open issues, and future directions
Drones have recently become one of the most important technological breakthroughs. They
have opened the horizon for a vast array of applications and paved the way for a diversity of …
have opened the horizon for a vast array of applications and paved the way for a diversity of …
[HTML][HTML] Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical …
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets,
and services that are vital for the functioning and well-being of a society, economy, or nation …
and services that are vital for the functioning and well-being of a society, economy, or nation …
Graph neural network-driven traffic forecasting for the connected internet of vehicles
Due to great advances in wireless communication, the connected Internet of vehicles
(CIoVs) has become prevalent. Naturally, internal connections among active vehicles are an …
(CIoVs) has become prevalent. Naturally, internal connections among active vehicles are an …
PPO2: Location privacy-oriented task offloading to edge computing using reinforcement learning for intelligent autonomous transport systems
AI-empowered 5G/6G networks play a substantial role in taking full advantage of the Internet
of Things (IoT) to perform complex computing by offloading tasks to edge services deployed …
of Things (IoT) to perform complex computing by offloading tasks to edge services deployed …
Performance evaluation of deep learning based network intrusion detection system across multiple balanced and imbalanced datasets
In the modern era of active network throughput and communication, the study of Intrusion
Detection Systems (IDS) is a crucial role to ensure safe network resources and information …
Detection Systems (IDS) is a crucial role to ensure safe network resources and information …
[HTML][HTML] Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine
J Zhang, Q Yan, X Zhu, K Yu - Digital Communications and Networks, 2023 - Elsevier
The crowd sensing technology can realize the sensing and computing of people, machines,
and environment in smart industrial IoT-based coal mine, which provides a solution for …
and environment in smart industrial IoT-based coal mine, which provides a solution for …
Cross-layer device authentication with quantum encryption for 5G enabled IIoT in industry 4.0
Industrial Internet of Things (IIoT), a core enabler of Industry 4.0, is evolving rapidly to tackle
the challenges imposed by explosive real-time manufacturing data in the context of Internet …
the challenges imposed by explosive real-time manufacturing data in the context of Internet …
Fuz-spam: Label smoothing-based fuzzy detection of spammers in internet of things
Nowadays, online spamming has already been a remarkable threat to contents security of
Internet of Things. Due to constant technical progress, online spamming activities have been …
Internet of Things. Due to constant technical progress, online spamming activities have been …
Reliability–Security Tradeoff Analysis in mmWave Ad Hoc–based CPS
Cyber-physical systems (CPS) offer integrated resolutions for various applications by
combining computer and physical components and enabling individual machines to work …
combining computer and physical components and enabling individual machines to work …
[HTML][HTML] IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic
A network intrusion detection system is critical for cyber security against illegitimate attacks.
In terms of feature perspectives, network traffic may include a variety of elements such as …
In terms of feature perspectives, network traffic may include a variety of elements such as …