Online first articles
Articles not assigned to an issue 398 articles
-
-
A machine learning-based ensemble model for securing the IoT network
Authors
- Rohit Singh
- Krishna Pal Sharma
- Lalit Kumar Awasthi
- Content type: OriginalPaper
- Published: 12 May 2024
-
Comprehensive framework for implementing blockchain-enabled federated learning and full homomorphic encryption for chatbot security system
Authors
- Nasir Ahmad Jalali
- Chen Hongsong
- Content type: OriginalPaper
- Published: 12 May 2024
-
A distributed load balancing method for IoT/Fog/Cloud environments with volatile resource support
Authors (first, second and last of 5)
- Zari Shamsa
- Ali Rezaee
- Amir Masoud Rahmani
- Content type: OriginalPaper
- Published: 11 May 2024
This is part of 1 collection: -
Benchmarking Micro2Micro transformation: an approach with GNN and VAE
Authors (first, second and last of 4)
- Md Showkat Hossain Chy
- Korn Sooksatra
- Tomas Cerny
- Content type: OriginalPaper
- Published: 11 May 2024
This is part of 1 collection: -
A hybrid genetic-based task scheduling algorithm for cost-efficient workflow execution in heterogeneous cloud computing environment
Authors (first, second and last of 4)
- Mohsen Khademi Dehnavi
- Ali Broumandnia
- Iman Ahanian
- Content type: OriginalPaper
- Published: 11 May 2024
-
Design of distributed network intrusion prevention system based on Spark and P2DR models
Authors (first, second and last of 4)
- Lei An
- Jiankai Qiu
- Chen Liu
- Content type: OriginalPaper
- Published: 11 May 2024
-
Integration of bat algorithm and salp swarm intelligence with stochastic difference variants for global optimization
Authors
- Hongye Li
- Jianan Wang
- Yanjie Zhu
- Content type: OriginalPaper
- Published: 11 May 2024
-
ARIR: an intent recognition-based approach for API recommendation
Authors (first, second and last of 6)
- Buqing Cao
- Siyuan Wang
- Zhenlian Peng
- Content type: OriginalPaper
- Published: 11 May 2024
-
Exploitation of healthcare IoT–fog-based smart e-health gateways: a resource optimization approach
Authors
- Bo Wen
- Shanzhi Li
- Hooman Motevalli
- Content type: OriginalPaper
- Published: 10 May 2024
-
Investigating large language models capabilities for automatic code repair in Python
Authors
- Safwan Omari
- Kshitiz Basnet
- Mohammad Wardat
- Content type: OriginalPaper
- Published: 09 May 2024
-
Efficientnetv2-RegNet: an effective deep learning framework for secure SDN based IOT network
Authors (first, second and last of 4)
- Baswaraju Swathi
- Soma Sekhar Kolisetty
- Srinivasa Rao Battula
- Content type: OriginalPaper
- Published: 09 May 2024
-
Easypay: a user-friendly blockchain-powered payment gateway
Authors (first, second and last of 6)
- Jhuma Dutta
- Subhas Barman
- Samiran Chattopadhyay
- Content type: OriginalPaper
- Published: 09 May 2024
-
Multi-strategy enhanced Grey Wolf Optimizer for global optimization and real world problems
Authors (first, second and last of 5)
- Zhendong Wang
- Donghui Dai
- Sammy Chan
- Content type: OriginalPaper
- Published: 09 May 2024
-
Multi-objective generalized normal distribution optimization: a novel algorithm for multi-objective problems
Authors (first, second and last of 8)
- Nima Khodadadi
- Ehsan Khodadadi
- Seyedali Mirjalili
- Content type: OriginalPaper
- Open Access
- Published: 08 May 2024
-
AI-based & heuristic workflow scheduling in cloud and fog computing: a systematic review
Authors (first, second and last of 4)
- Navid Khaledian
- Marcus Voelp
- Mirsaeid Hosseini Shirvani
- Content type: ReviewPaper
- Published: 08 May 2024
-
Performance optimization of Spark MLlib workloads using cost efficient RICG model on exponential projective sampling
Authors
- Piyush Sewal
- Hari Singh
- Content type: OriginalPaper
- Published: 08 May 2024
-
A knowledge graph embedding model based on multi-level analogical reasoning
Authors
- Xiaofei Zhao
- Mengqian Yang
- Hongji Yang
- Content type: OriginalPaper
- Published: 07 May 2024
-
Intelligent patrol inspection of low code enabled electric power communication equipment based on digital transformation
Authors (first, second and last of 5)
- Xing Huang
- Li Li
- Meng Li
- Content type: OriginalPaper
- Published: 06 May 2024
-
A novel approach detection for IIoT attacks via artificial intelligence
Authors
- Gökçe Karacayılmaz
- Harun Artuner
- Content type: OriginalPaper
- Open Access
- Published: 06 May 2024
-
Adaptive dynamic elite opposition-based Ali Baba and the forty thieves algorithm for high-dimensional feature selection
Authors (first, second and last of 5)
- Malik Braik
- Mohammed A. Awadallah
- Abdelazim G. Hussien
- Content type: OriginalPaper
- Published: 06 May 2024
-
Graph-ensemble fusion for enhanced IoT intrusion detection: leveraging GCN and deep learning
Authors
- Kajol Mittal
- Payal Khurana Batra
- Content type: OriginalPaper
- Published: 06 May 2024
-
Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing
Authors
- Xiaolong Zhao
- Zhenjie Huang
- Content type: OriginalPaper
- Published: 06 May 2024
-
Medical diagnosis using interval type-2 fuzzy similarity measures
Authors (first, second and last of 4)
- Sahar Cherif
- Hamdi Kchaou
- Ghadah Aldehim
- Content type: OriginalPaper
- Published: 06 May 2024
-
A tube-based model predictive control method for intelligent vehicles path tracking
Authors (first, second and last of 4)
- Xu Yang
- Feiyang Wu
- Shengshi Zhong
- Content type: OriginalPaper
- Published: 05 May 2024
-
Novel hybrid classifier based on fuzzy type-III decision maker and ensemble deep learning model and improved chaos game optimization
Authors (first, second and last of 5)
- Nastaran Mehrabi Hashjin
- Mohammad Hussein Amiri
- Nima Khodadadi
- Content type: OriginalPaper
- Open Access
- Published: 05 May 2024
-
K-means and meta-heuristic algorithms for intrusion detection systems
Authors
- Mahdieh Maazalahi
- Soodeh Hosseini
- Content type: OriginalPaper
- Published: 05 May 2024
-
Multicriteria client selection model using class topper optimization based optimal federated learning for healthcare informatics
Authors
- Mamta Narwaria
- Shruti Jaiswal
- Content type: OriginalPaper
- Published: 05 May 2024
-
A cutting-edge intelligent cyber model for intrusion detection in IoT environments leveraging future generations networks
Authors (first, second and last of 5)
- Ala Mughaid
- Asma Alnajjar
- Shadi AlZu’bi
- Content type: OriginalPaper
- Published: 05 May 2024
-
A new binary chaos-based metaheuristic algorithm for software defect prediction
Authors (first, second and last of 4)
- Bahman Arasteh
- Keyvan Arasteh
- Reza Ghanbarzadeh
- Content type: OriginalPaper
- Open Access
- Published: 04 May 2024
-
Hybrid remora crayfish optimization for engineering and wireless sensor network coverage optimization
Authors (first, second and last of 4)
- Rui Zhong
- Qinqin Fan
- Jun Yu
- Content type: OriginalPaper
- Published: 04 May 2024
-
Innovative combination of covariance analysis-based sliding time window and task-related component analysis for steady-state visual evoked potential recognition
Authors (first, second and last of 7)
- Jiaofen Nan
- Siyuan Zhang
- Tanxin Zhu
- Content type: OriginalPaper
- Published: 04 May 2024
-
Educert-chain: a secure and notarized educational certificate authentication and verification system using permissioned blockchain
Authors
- Prity Rani
- Rohit Kumar Sachan
- Sonal Kukreja
- Content type: OriginalPaper
- Published: 04 May 2024
-
Enhanced artificial ecosystem-based optimization for global optimization and constrained engineering problems
Authors (first, second and last of 5)
- Yunpeng Wang
- Jixiang Zhang
- Ming Yang
- Content type: OriginalPaper
- Published: 04 May 2024
-
An innovative multi-head attention model with BiMGRU for real-time electric vehicle charging management through deep reinforcement learning
Authors (first, second and last of 5)
- Shivendu Mishra
- Anurag Choubey
- Rajiv Misra
- Content type: OriginalPaper
- Published: 03 May 2024
-
Attention-based ResNet for intrusion detection and severity analysis using sliding window blockchain and firewall in IoT
Authors (first, second and last of 4)
- Ernest Ntizikira
- Lei Wang
- Xinxin Lu
- Content type: OriginalPaper
- Published: 03 May 2024
-
Robust intrusion detection for network communication on the Internet of Things: a hybrid machine learning approach
Authors (first, second and last of 4)
- Nasim Soltani
- Amir Masoud Rahmani
- Mehdi Hosseinzadeh
- Content type: OriginalPaper
- Published: 03 May 2024
-
A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer
Authors
- E. I. Elsedimy
- Hala Elhadidy
- Sara M. M. Abohashish
- Content type: OriginalPaper
- Open Access
- Published: 02 May 2024
-
Multi-class intrusion detection system in SDN based on hybrid BiLSTM model
Authors (first, second and last of 6)
- Meng Cui
- Jue Chen
- Xinyu Zhang
- Content type: OriginalPaper
- Published: 02 May 2024
-
Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control
Authors (first, second and last of 5)
- Kai Zhang
- Tao Chen
- Jianting Ning
- Content type: OriginalPaper
- Published: 02 May 2024
-
An online ensemble method for auto-scaling NFV-based applications in the edge
Authors (first, second and last of 4)
- Thiago Pereira da Silva
- Thais Vasconcelos Batista
- Paulo Ferreira Pires
- Content type: OriginalPaper
- Published: 01 May 2024
This is part of 1 collection: -
Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs
Authors (first, second and last of 4)
- Wael Khalafalla
- Wen-Xing Zhu
- Issameldeen Elfadul
- Content type: OriginalPaper
- Published: 30 April 2024
-
Combined economic and emission power dispatch problems through multi-objective Honey Badger optimizer
Authors (first, second and last of 5)
- Fengxian Wang
- Senlin Bi
- Chenglin Guo
- Content type: OriginalPaper
- Published: 30 April 2024
-
Performance analysis of P2P network based on differentiated service Geo/Geo/1 + 1 queue
Authors (first, second and last of 5)
- Ying Shen
- Zhanyou Ma
- Guoli Qin
- Content type: OriginalPaper
- Published: 30 April 2024
-
IOTD: intelligent offloading of tasks with deadlines in edge-fog-cloud computing environment using hybrid approach
Authors
- Posham Bhargava Reddy
- Chapram Sudhakar
- Content type: OriginalPaper
- Published: 30 April 2024
-
Content caching in mobile edge computing: a survey
Authors (first, second and last of 7)
- Yasar Khan
- Saad Mustafa
- Joel J.P.C. Rodrigues
- Content type: ReviewPaper
- Published: 30 April 2024
-
Anomaly detection framework for IoT-enabled appliances using machine learning
Authors
- Mohd Ahsan Siddiqui
- C. Rama Krishna
- Mala Kalra
- Content type: OriginalPaper
- Published: 30 April 2024
-
Enhanced time-sensitive networking configuration detection using optimized BPNN with feature selection for industry 4.0
Authors (first, second and last of 8)
- Cheng Wang
- Lin Chen
- Zhan Huan
- Content type: OriginalPaper
- Published: 29 April 2024
-
SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection
Authors (first, second and last of 5)
- Arjun Singh
- Preeti Mishra
- Mauro Conti
- Content type: OriginalPaper
- Published: 29 April 2024
-
Forest fire monitoring system supported by unmanned aerial vehicles and edge computing: a performance evaluation using petri nets
Authors (first, second and last of 7)
- Arthur Sabino
- Luiz Nelson Lima
- Francisco Airton Silva
- Content type: OriginalPaper
- Published: 29 April 2024
For authors
Submit manuscriptWorking on a manuscript?
Avoid the most common mistakes and prepare your manuscript for journal editors.
Learn more