Graph-ensemble fusion for enhanced IoT intrusion detection: leveraging GCN and deep learning Kajol MittalPayal Khurana Batra OriginalPaper 06 May 2024
A tube-based model predictive control method for intelligent vehicles path tracking Xu YangFeiyang WuShengshi Zhong OriginalPaper 05 May 2024
Novel hybrid classifier based on fuzzy type-III decision maker and ensemble deep learning model and improved chaos game optimization Nastaran Mehrabi HashjinMohammad Hussein AmiriNima Khodadadi OriginalPaper Open access 05 May 2024
K-means and meta-heuristic algorithms for intrusion detection systems Mahdieh MaazalahiSoodeh Hosseini OriginalPaper 05 May 2024
Multicriteria client selection model using class topper optimization based optimal federated learning for healthcare informatics Mamta NarwariaShruti Jaiswal OriginalPaper 05 May 2024
A cutting-edge intelligent cyber model for intrusion detection in IoT environments leveraging future generations networks Ala MughaidAsma AlnajjarShadi AlZu’bi OriginalPaper 05 May 2024
A new binary chaos-based metaheuristic algorithm for software defect prediction Bahman ArastehKeyvan ArastehReza Ghanbarzadeh OriginalPaper Open access 04 May 2024
Hybrid remora crayfish optimization for engineering and wireless sensor network coverage optimization Rui ZhongQinqin FanJun Yu OriginalPaper 04 May 2024
Innovative combination of covariance analysis-based sliding time window and task-related component analysis for steady-state visual evoked potential recognition Jiaofen NanSiyuan ZhangTanxin Zhu OriginalPaper 04 May 2024
Educert-chain: a secure and notarized educational certificate authentication and verification system using permissioned blockchain Prity RaniRohit Kumar SachanSonal Kukreja OriginalPaper 04 May 2024
Enhanced artificial ecosystem-based optimization for global optimization and constrained engineering problems Yunpeng WangJixiang ZhangMing Yang OriginalPaper 04 May 2024
An innovative multi-head attention model with BiMGRU for real-time electric vehicle charging management through deep reinforcement learning Shivendu MishraAnurag ChoubeyRajiv Misra OriginalPaper 03 May 2024
Attention-based ResNet for intrusion detection and severity analysis using sliding window blockchain and firewall in IoT Ernest NtizikiraLei WangXinxin Lu OriginalPaper 03 May 2024
Robust intrusion detection for network communication on the Internet of Things: a hybrid machine learning approach Nasim SoltaniAmir Masoud RahmaniMehdi Hosseinzadeh OriginalPaper 03 May 2024
A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer E. I. ElsedimyHala ElhadidySara M. M. Abohashish OriginalPaper Open access 02 May 2024
Multi-class intrusion detection system in SDN based on hybrid BiLSTM model Meng CuiJue ChenXinyu Zhang OriginalPaper 02 May 2024
Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control Kai ZhangTao ChenJianting Ning OriginalPaper 02 May 2024
An online ensemble method for auto-scaling NFV-based applications in the edge Thiago Pereira da SilvaThais Vasconcelos BatistaPaulo Ferreira Pires OriginalPaper 01 May 2024
Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs Wael KhalafallaWen-Xing ZhuIssameldeen Elfadul OriginalPaper 30 April 2024
Combined economic and emission power dispatch problems through multi-objective Honey Badger optimizer Fengxian WangSenlin BiChenglin Guo OriginalPaper 30 April 2024
Performance analysis of P2P network based on differentiated service Geo/Geo/1 + 1 queue Ying ShenZhanyou MaGuoli Qin OriginalPaper 30 April 2024
IOTD: intelligent offloading of tasks with deadlines in edge-fog-cloud computing environment using hybrid approach Posham Bhargava ReddyChapram Sudhakar OriginalPaper 30 April 2024
Content caching in mobile edge computing: a survey Yasar KhanSaad MustafaJoel J.P.C. Rodrigues ReviewPaper 30 April 2024
Anomaly detection framework for IoT-enabled appliances using machine learning Mohd Ahsan SiddiquiC. Rama KrishnaMala Kalra OriginalPaper 30 April 2024
Enhanced time-sensitive networking configuration detection using optimized BPNN with feature selection for industry 4.0 Cheng WangLin ChenZhan Huan OriginalPaper 29 April 2024
SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection Arjun SinghPreeti MishraMauro Conti OriginalPaper 29 April 2024
Forest fire monitoring system supported by unmanned aerial vehicles and edge computing: a performance evaluation using petri nets Arthur SabinoLuiz Nelson LimaFrancisco Airton Silva OriginalPaper 29 April 2024
LTLBC: a low-latency lightweight block cipher for internet of things Wei SunLang LiXiantong Huang OriginalPaper 29 April 2024
STA-former: encoding traffic flows with spatio-temporal associations in transformer networks for prediction Hui ZengXuewei DuanQiang Cui OriginalPaper 26 April 2024
Particle swarm optimization and fuzzy logic based clustering and routing protocol to enhance lifetime for wireless sensor networks Huangshui HuXinji FanYuhuan Deng OriginalPaper 26 April 2024
Securing multi-client range queries over encrypted data Jae Hwan ParkZeinab RezaeifarChanghee Hahn OriginalPaper 26 April 2024
Towards establishing intelligent multi-domain edge orchestration for highly distributed immersive services: a virtual touring use case Tarik Zakaria BenmerarTheodoros TheodoropoulosLuis Cordeiro OriginalPaper 26 April 2024
A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directions Wengui HuQingsong CaoNima Jafari Navimipour ReviewPaper 26 April 2024
HCA-YOLO: a non-salient object detection method based on hierarchical attention mechanism Chengang DongYuhao TangLiyan Zhang OriginalPaper 25 April 2024
CSDANet: a new lightweight fault diagnosis framework towards heavy noise and small samples Zhao XuZhiyang JiaWenpei Dong OriginalPaper 25 April 2024
Intrusion detection systems for software-defined networks: a comprehensive study on machine learning-based techniques Zaid MustafaRashid AminNaeem Ahmed OriginalPaper 25 April 2024
From static code analysis to visual models of microservice architecture Tomas CernyAmr S. AbdelfattahDavide Taibi OriginalPaper 24 April 2024
Design tactics for tailoring transformer architectures to cybersecurity challenges Cigdem AvciBedir TekinerdoganCagatay Catal OriginalPaper Open access 24 April 2024
Hybrid-grained migration method for load redistribution in heavily-loaded fog nodes Mohammed JasimNazli Siasi OriginalPaper 24 April 2024
Compound improved Harris hawks optimization for global and engineering optimization Chengtian OuyangChang LiaoChengye Zou OriginalPaper 24 April 2024
CLARA: clustered learning automata-based routing algorithm for efficient FANET communication Somayeh DaneshJavad Akbari Torkestani OriginalPaper 24 April 2024
A mean opinion score prediction model for VoIP calls offloading handover from LTE to WiFi Najib MouhassineMohamed Moughit OriginalPaper 24 April 2024
A metaheuristic approach based on coronavirus herd immunity optimiser for breast cancer diagnosis Ali HosseinalipourReza GhanbarzadehSeyedali Mirjalili OriginalPaper 23 April 2024
ARPMEC: an adaptive mobile edge computing-based routing protocol for IoT networks Miguel Landry Foko SindjoungMthulisi VelempiniVianney Kengne Tchendji OriginalPaper Open access 23 April 2024
Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning Sadananda LingayyaSathyendra Bhat JodumuttSenthilkumar Chandrasekan OriginalPaper 22 April 2024
Autonomous UAV-based surveillance system for multi-target detection using reinforcement learning Haythem Bany SalamehAyyoub HussienatAhmad Al-Ajlouni OriginalPaper 21 April 2024
Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities Sujit BiswasRajat Subhra GoswamiK. Hemant Kumar Reddy OriginalPaper 21 April 2024
An efficient improved exponential distribution optimizer: application to the global, engineering and combinatorial optimization problems Essam H. HousseinMahmoud Khalaf SaeedMustafa M. Al-Sayed OriginalPaper Open access 20 April 2024
DFARM: a deadline-aware fault-tolerant scheduler for cloud computing Ahmad AwanMuhammad AleemRadu Prodan OriginalPaper 20 April 2024
Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency Md Jobair Hossain FarukFazlul AlamAkond Rahman OriginalPaper Open access 19 April 2024