BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology
M Vivekanandan, S VN, SR U - Peer-to-Peer networking and applications, 2021 - Springer
Due to the advancement of wireless technology, the Internet of Things (IoT) Device to Device
communication for exchanging messages is feasible without human involvement …
communication for exchanging messages is feasible without human involvement …
Intelligent automated intrusion response system based on fuzzy decision making and risk assessment
The most important aim of Automated Intrusion Response Systems (AIRSs) is selecting
responses that impose less cost on the protected system and which are able to neutralize …
responses that impose less cost on the protected system and which are able to neutralize …
Structural‐based tunneling: preserving mutual anonymity for circular P2P networks
A Naghizadeh, S Berenjian… - International Journal …, 2016 - Wiley Online Library
Many methods are suggested to preserve anonymity of users for peer‐to‐peer (P2P)
networks. Most of these methods, by relying on established anonymous solutions on …
networks. Most of these methods, by relying on established anonymous solutions on …
Enhancing the performance of permissionless blockchain networks through randomized message-based consensus algorithm
M Ayenew, H Lei, X Li, Q Weizhong, E Abeje… - Peer-to-Peer Networking …, 2023 - Springer
A public blockchain network ensures security, performance, and integrity through its
consensus algorithm. However, most public blockchain consensus algorithms require …
consensus algorithm. However, most public blockchain consensus algorithms require …
An incentive security model to provide fairness for peer-to-peer networks
S Berenjian, S Hajizadeh… - 2019 IEEE Conference on …, 2019 - ieeexplore.ieee.org
Peer-to-Peer networks are designed to rely on the resources of their own users. Therefore,
resource management plays an important role in P2P protocols. Early P2P networks did not …
resource management plays an important role in P2P protocols. Early P2P networks did not …
Ontology based information integration: a survey
M Alizadeh, MH Shahrezaei… - arXiv preprint arXiv …, 2019 - arxiv.org
An ontology makes a special vocabulary which describes the domain of interest and the
meaning of the term on that vocabulary. Based on the precision of the specification, the …
meaning of the term on that vocabulary. Based on the precision of the specification, the …
Blockchain for 5G-enabled networks in healthcare service based on several aspects
The pandemic crisis caused by COVID-19 is having a significant impact on our daily work
and lives. 5G networks are ready to roll out across the world. This 5G technology helps by …
and lives. 5G networks are ready to roll out across the world. This 5G technology helps by …
Parallelization of Kmeans++ using CUDA
MH Shahrezaei, R Tavoli - arXiv preprint arXiv:1908.02136, 2019 - arxiv.org
K-means++ is an algorithm which is invented to improve the process of finding initial seeds
in K-means algorithm. In this algorithm, initial seeds are chosen consecutively by a …
in K-means algorithm. In this algorithm, initial seeds are chosen consecutively by a …
A survey on ontology operations techniques
M Maroun - Mathematical and Software Engineering, 2021 - varepsilon.com
Ontologies are increasingly seen as key factors in enabling interoperability between
heterogeneous systems and semantic web applications and are emerging as representative …
heterogeneous systems and semantic web applications and are emerging as representative …
Encryption-Based Secure Protocol Design for Networks
S Berenjian - 2023 - search.proquest.com
Security is vital for any distributed computing application running over a set of networked
machines, some of which may possibly misbehave, due to misconfigurations, cost-cutting …
machines, some of which may possibly misbehave, due to misconfigurations, cost-cutting …