Blockchain and federated learning-based security solutions for telesurgery system: a comprehensive review
S Chaudjary, R Kakkar, R Gupta… - Turkish Journal of …, 2022 - journals.tubitak.gov.tr
The advent of telemedicine with its remote surgical procedures has effectively transformed
the working of healthcare professionals. The evolution of telemedicine facilitates the remote …
the working of healthcare professionals. The evolution of telemedicine facilitates the remote …
Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review
A Oztoprak, R Hassanpour, A Ozkan… - ACM Computing …, 2024 - dl.acm.org
Wireless Sensor Networks (WSNs) represent an innovative technology that integrates
compact, energy-efficient sensors with wireless communication functionalities, facilitating …
compact, energy-efficient sensors with wireless communication functionalities, facilitating …
Physical cyber-security algorithm for wireless sensor networks
DD Khudhur, MS Croock - … Computing Electronics and Control …, 2021 - telkomnika.uad.ac.id
Today, the wireless sensor network (WSN) plays an important role in our daily life. In
addition, it is used in many applications such as military, medical, greenhouse, and …
addition, it is used in many applications such as military, medical, greenhouse, and …
Intrusion detection in cluster‐based wireless sensor networks: Current issues, opportunities and future research directions
Wireless sensor network (WSN) cluster‐based architecture is a system designed to control
and monitor specific events or phenomena remotely, and one of the important concerns that …
and monitor specific events or phenomena remotely, and one of the important concerns that …
VMRF: revolutionizing military border surveillance with extensive coverage and connectivity
SP Subotha, L Femila - Telecommunication Systems, 2024 - Springer
Nowadays, wireless sensor networks (WSNs) are utilised in military-based applications like
border surveillance. However, existing border surveillance methods have difficulties with …
border surveillance. However, existing border surveillance methods have difficulties with …
[PDF][PDF] Lightweight Cryptography Using Pairwise Key Generation and Malicious Node Detection in Large Wireless Sensor Network
Objectives: To design and develop pairwise key generation techniques for malicious node
detection in wireless sensor network. Method: The lightweight key generation method has …
detection in wireless sensor network. Method: The lightweight key generation method has …
无人船网络信息安全技术综述.
林彬, 许菲, 窦欣宇, 徐世鹏… - Telecommunication …, 2022 - search.ebscohost.com
随着智能航运时代的到来, 世界各国都在积极推动无人船的研发工作. 与此同时,
无人船所面临的网络信息安全问题逐渐显露, 已经成为阻碍行业发展的重大挑战之一 …
无人船所面临的网络信息安全问题逐渐显露, 已经成为阻碍行业发展的重大挑战之一 …
Cross-layer Based Intrusion Detection System for Wireless Sensor Networks: Challenges, Solutions, and Future Directions
N Nordin, MS Mohd Pozi - International Conference on Computing and …, 2023 - Springer
Abstract Wireless Sensor Networks (WSNs) consist of numerous affordable, energy-efficient,
compact wireless sensors. These sensors are designed to collect, process, and …
compact wireless sensors. These sensors are designed to collect, process, and …
Security Techniques of Wireless Sensor Networks: A Study
H Sharma, B Shajahan - 2022 2nd International Conference on …, 2022 - ieeexplore.ieee.org
WSNs (wireless sensor networks) are linked to the internet, making them a powerful network
for dealing with real-world problems. As revolutionary technologies grow swiftly, a …
for dealing with real-world problems. As revolutionary technologies grow swiftly, a …
ML-Augmented Network Packet Broker based Anomaly Detection at IIoT-Edge Egress Port
GVK Sasirekha, GH Annapoorna, M Rao… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) refers to networked entities like smart sensors, actuators,
computers, etc., deployed to enhance the manufacturing and industrial processes. However …
computers, etc., deployed to enhance the manufacturing and industrial processes. However …