BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology

M Vivekanandan, S VN, SR U - Peer-to-Peer networking and applications, 2021 - Springer
Due to the advancement of wireless technology, the Internet of Things (IoT) Device to Device
communication for exchanging messages is feasible without human involvement …

Intelligent automated intrusion response system based on fuzzy decision making and risk assessment

S Berenjian, M Shajari, N Farshid… - 2016 IEEE 8th …, 2016 - ieeexplore.ieee.org
The most important aim of Automated Intrusion Response Systems (AIRSs) is selecting
responses that impose less cost on the protected system and which are able to neutralize …

Structural‐based tunneling: preserving mutual anonymity for circular P2P networks

A Naghizadeh, S Berenjian… - International Journal …, 2016 - Wiley Online Library
Many methods are suggested to preserve anonymity of users for peer‐to‐peer (P2P)
networks. Most of these methods, by relying on established anonymous solutions on …

Enhancing the performance of permissionless blockchain networks through randomized message-based consensus algorithm

M Ayenew, H Lei, X Li, Q Weizhong, E Abeje… - Peer-to-Peer Networking …, 2023 - Springer
A public blockchain network ensures security, performance, and integrity through its
consensus algorithm. However, most public blockchain consensus algorithms require …

An incentive security model to provide fairness for peer-to-peer networks

S Berenjian, S Hajizadeh… - 2019 IEEE Conference on …, 2019 - ieeexplore.ieee.org
Peer-to-Peer networks are designed to rely on the resources of their own users. Therefore,
resource management plays an important role in P2P protocols. Early P2P networks did not …

Ontology based information integration: a survey

M Alizadeh, MH Shahrezaei… - arXiv preprint arXiv …, 2019 - arxiv.org
An ontology makes a special vocabulary which describes the domain of interest and the
meaning of the term on that vocabulary. Based on the precision of the specification, the …

Blockchain for 5G-enabled networks in healthcare service based on several aspects

G Jain, A Jain - Blockchain Applications for Healthcare Informatics, 2022 - Elsevier
The pandemic crisis caused by COVID-19 is having a significant impact on our daily work
and lives. 5G networks are ready to roll out across the world. This 5G technology helps by …

Parallelization of Kmeans++ using CUDA

MH Shahrezaei, R Tavoli - arXiv preprint arXiv:1908.02136, 2019 - arxiv.org
K-means++ is an algorithm which is invented to improve the process of finding initial seeds
in K-means algorithm. In this algorithm, initial seeds are chosen consecutively by a …

A survey on ontology operations techniques

M Maroun - Mathematical and Software Engineering, 2021 - varepsilon.com
Ontologies are increasingly seen as key factors in enabling interoperability between
heterogeneous systems and semantic web applications and are emerging as representative …

Encryption-Based Secure Protocol Design for Networks

S Berenjian - 2023 - search.proquest.com
Security is vital for any distributed computing application running over a set of networked
machines, some of which may possibly misbehave, due to misconfigurations, cost-cutting …