A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer E. I. ElsedimyHala ElhadidySara M. M. Abohashish OriginalPaper Open access 02 May 2024
Multi-class intrusion detection system in SDN based on hybrid BiLSTM model Meng CuiJue ChenXinyu Zhang OriginalPaper 02 May 2024
Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control Kai ZhangTao ChenJianting Ning OriginalPaper 02 May 2024
An online ensemble method for auto-scaling NFV-based applications in the edge Thiago Pereira da SilvaThais Vasconcelos BatistaPaulo Ferreira Pires OriginalPaper 01 May 2024
Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs Wael KhalafallaWen-Xing ZhuIssameldeen Elfadul OriginalPaper 30 April 2024
Combined economic and emission power dispatch problems through multi-objective Honey Badger optimizer Fengxian WangSenlin BiChenglin Guo OriginalPaper 30 April 2024
Performance analysis of P2P network based on differentiated service Geo/Geo/1 + 1 queue Ying ShenZhanyou MaGuoli Qin OriginalPaper 30 April 2024
IOTD: intelligent offloading of tasks with deadlines in edge-fog-cloud computing environment using hybrid approach Posham Bhargava ReddyChapram Sudhakar OriginalPaper 30 April 2024
Content caching in mobile edge computing: a survey Yasar KhanSaad MustafaJoel J.P.C. Rodrigues ReviewPaper 30 April 2024
Anomaly detection framework for IoT-enabled appliances using machine learning Mohd Ahsan SiddiquiC. Rama KrishnaMala Kalra OriginalPaper 30 April 2024
Enhanced time-sensitive networking configuration detection using optimized BPNN with feature selection for industry 4.0 Cheng WangLin ChenZhan Huan OriginalPaper 29 April 2024
SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection Arjun SinghPreeti MishraMauro Conti OriginalPaper 29 April 2024
Forest fire monitoring system supported by unmanned aerial vehicles and edge computing: a performance evaluation using petri nets Arthur SabinoLuiz Nelson LimaFrancisco Airton Silva OriginalPaper 29 April 2024
LTLBC: a low-latency lightweight block cipher for internet of things Wei SunLang LiXiantong Huang OriginalPaper 29 April 2024
STA-former: encoding traffic flows with spatio-temporal associations in transformer networks for prediction Hui ZengXuewei DuanQiang Cui OriginalPaper 26 April 2024
Particle swarm optimization and fuzzy logic based clustering and routing protocol to enhance lifetime for wireless sensor networks Huangshui HuXinji FanYuhuan Deng OriginalPaper 26 April 2024
Securing multi-client range queries over encrypted data Jae Hwan ParkZeinab RezaeifarChanghee Hahn OriginalPaper 26 April 2024
Towards establishing intelligent multi-domain edge orchestration for highly distributed immersive services: a virtual touring use case Tarik Zakaria BenmerarTheodoros TheodoropoulosLuis Cordeiro OriginalPaper 26 April 2024
A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directions Wengui HuQingsong CaoNima Jafari Navimipour ReviewPaper 26 April 2024
HCA-YOLO: a non-salient object detection method based on hierarchical attention mechanism Chengang DongYuhao TangLiyan Zhang OriginalPaper 25 April 2024
CSDANet: a new lightweight fault diagnosis framework towards heavy noise and small samples Zhao XuZhiyang JiaWenpei Dong OriginalPaper 25 April 2024
Intrusion detection systems for software-defined networks: a comprehensive study on machine learning-based techniques Zaid MustafaRashid AminNaeem Ahmed OriginalPaper 25 April 2024
From static code analysis to visual models of microservice architecture Tomas CernyAmr S. AbdelfattahDavide Taibi OriginalPaper 24 April 2024
Design tactics for tailoring transformer architectures to cybersecurity challenges Cigdem AvciBedir TekinerdoganCagatay Catal OriginalPaper Open access 24 April 2024
Hybrid-grained migration method for load redistribution in heavily-loaded fog nodes Mohammed JasimNazli Siasi OriginalPaper 24 April 2024
Compound improved Harris hawks optimization for global and engineering optimization Chengtian OuyangChang LiaoChengye Zou OriginalPaper 24 April 2024
CLARA: clustered learning automata-based routing algorithm for efficient FANET communication Somayeh DaneshJavad Akbari Torkestani OriginalPaper 24 April 2024
A mean opinion score prediction model for VoIP calls offloading handover from LTE to WiFi Najib MouhassineMohamed Moughit OriginalPaper 24 April 2024
A metaheuristic approach based on coronavirus herd immunity optimiser for breast cancer diagnosis Ali HosseinalipourReza GhanbarzadehSeyedali Mirjalili OriginalPaper 23 April 2024
ARPMEC: an adaptive mobile edge computing-based routing protocol for IoT networks Miguel Landry Foko SindjoungMthulisi VelempiniVianney Kengne Tchendji OriginalPaper Open access 23 April 2024
Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning Sadananda LingayyaSathyendra Bhat JodumuttSenthilkumar Chandrasekan OriginalPaper 22 April 2024
Autonomous UAV-based surveillance system for multi-target detection using reinforcement learning Haythem Bany SalamehAyyoub HussienatAhmad Al-Ajlouni OriginalPaper 21 April 2024
Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities Sujit BiswasRajat Subhra GoswamiK. Hemant Kumar Reddy OriginalPaper 21 April 2024
An efficient improved exponential distribution optimizer: application to the global, engineering and combinatorial optimization problems Essam H. HousseinMahmoud Khalaf SaeedMustafa M. Al-Sayed OriginalPaper Open access 20 April 2024
DFARM: a deadline-aware fault-tolerant scheduler for cloud computing Ahmad AwanMuhammad AleemRadu Prodan OriginalPaper 20 April 2024
Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency Md Jobair Hossain FarukFazlul AlamAkond Rahman OriginalPaper Open access 19 April 2024
Slam loop closure detection algorithm based on MSA-SG Heng ZhangYihong ZhangYawei Li OriginalPaper 18 April 2024
StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control Shahab SafaeeMeghdad MirabiAli Asghar Safaei OriginalPaper 18 April 2024
Optimal analysis in cognitive radio networks with imperfect sensing based on retrial queues with feedback and priority Ruiling TianYadan XueYuting Song OriginalPaper 18 April 2024
A comprehensive node-based botnet detection framework for IoT network Abdulaziz AldaejTariq Ahamed AhangerImdad Ullah OriginalPaper 18 April 2024
Blockchain-based secure and scalable supply chain management system to prevent drug counterfeiting Sagnik DattaSuyel Namasudra OriginalPaper 18 April 2024
Drones as a service (DaaS) for 5G networks and blockchain-assisted IoT-based smart city infrastructure Tanya GargShashank GuptaMeghna Raj ReviewPaper 17 April 2024
Deep learning vs. adversarial noise: a battle in malware image analysis K. A. AsmithaVinod PuthuvathS. L. Ananth OriginalPaper 17 April 2024
Reinforcement learning marine predators algorithm for global optimization Jianlan WangZhendong WangDahai Li OriginalPaper 17 April 2024
Cepair: an AI-powered and fog-based predictive CEP system for air quality monitoring Mehmet Ulvi Şimsekİbrahim KökSuat Özdemir OriginalPaper Open access 16 April 2024
Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing Mohd AkbarMohammed Mujtaba WaseemPraveen Barmavatu OriginalPaper 16 April 2024
When Fewer Cores Is Faster: A Parametric Study of Undersubscription in High-Performance Computing Reid PrichardWayne Strasser OriginalPaper 16 April 2024
Securing internet of things using machine and deep learning methods: a survey Ali GhaffariNasim JelodariBahman Arasteh OriginalPaper Open access 16 April 2024
Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review Fatma HendaouiAhlem FerchichiManel Khazri Khelifi ReviewPaper 15 April 2024
Exploring the stochastic patterns of hyperchaotic Lorenz systems with variable fractional order and radial basis function networks Muhammad AwaisMuhammad Adnan KhanZia Bashir OriginalPaper 15 April 2024