-
41
Social Networks Link Prediction Based on Incremental Learning
Published 2025-03-01“…Objective Various types of relationships in social networks exist between nodes, and the number of nodes changes over time. …”
Get full text
Article -
42
NUNS: A Nonuniform Network Split Method for Data-Centric Storage Sensor Networks
Published 2012-06-01Get full text
Article -
43
Fuzzy logic based social trust computation scheme in Flying Ad-hoc network
Published 2025-03-01“…The Flying Ad Hoc Networks (FANETs) are becoming more popular in civic security, military, and multipurpose applications. …”
Get full text
Article -
44
Reinforcement Learning for Mitigating Malware Propagation in Wireless Radar Sensor Networks with Channel Modeling
Published 2025-04-01“…With the rapid development of research on Wireless Radar Sensor Networks (WRSNs), security issues have become a major challenge. Recent studies have highlighted numerous security threats in WRSNs. …”
Get full text
Article -
45
Cognitive intelligence routing protocol for disaster management and underwater communication system in underwater acoustic network
Published 2025-03-01“…Abstract Future communication paradigms, such as 6G networks, emphasize self-sustainability, intelligent networking, and secure, adaptive communication. This research presents an innovative routing framework tailored for Underwater Sensor Networks (UWSNs) and Underwater Acoustic Networks (UANs), addressing critical challenges like energy constraints, security vulnerabilities, limited bandwidth, and interference. …”
Get full text
Article -
46
Online Authentication and Key Establishment Scheme for Heterogeneous Sensor Networks
Published 2014-11-01Get full text
Article -
47
A novel method for asynchronous source localisation based on time of arrival measurements
Published 2021-10-01Get full text
Article -
48
Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms
Published 2025-07-01“…Abstract Internet of Vehicles (IoV) is a multi-node network which switches data in an open and wireless environment. …”
Get full text
Article -
49
CAB-IoT: Continuous authentication architecture based on Blockchain for internet of things
Published 2022-06-01“…Moreover, mutual authentication between end-users and fog nodes is also designed, as well as secure communication between the authenticated nodes. …”
Get full text
Article -
50
Link stability - based optimal routing path for efficient data communication in MANET
Published 2024-08-01“…To ensure secure communication, secret keys (SK) are generated for both the Sender Node (SN) and the Receiver Node (RN) using Galois Theory. …”
Get full text
Article -
51
-
52
Analyzing cryptographic algorithm efficiency with in graph-based encryption models
Published 2025-07-01“…Experimental results indicate that RSA demonstrates superior time efficiency and resource utilization, whereas the ElGamal algorithm exhibits greater memory efficiency and resourcefulness. …”
Get full text
Article -
53
A Novel FDIA Model for Virtual Power Plant Cyber–Physical Systems Based on Network Topology and DG Outputs
Published 2025-03-01“…The effectiveness and superiority of the proposal are numerically verified on a 62-node cyber–physical system. …”
Get full text
Article -
54
-
55
AFF_CGE: Combined Attention-Aware Feature Fusion and Communication Graph Embedding Learning for Detecting Encrypted Malicious Traffic
Published 2024-11-01“…While encryption enhances data security, it also presents significant challenges for network traffic analysis, especially in detecting malicious activities. …”
Get full text
Article -
56
Augmenting cybersecurity through attention based stacked autoencoder with optimization algorithm for detection and mitigation of attacks on IoT assisted networks
Published 2024-12-01“…In an IoT network, the massive amount of connecting nodes is the existence of day-to-day communication challenges. …”
Get full text
Article -
57
Short-Block Polar-Coded Reverse and Direct Reconciliation in CV-QKD
Published 2025-01-01“…Specifically, Polar codes safeguard quantum transmissions due to their superior performance for short block lengths, while LDPC codes robustly protect the classical side information exchanged over auxiliary classical channels. …”
Get full text
Article -
58
Federated Learning-Based Trust Evaluation With Fuzzy Logic for Privacy and Robustness in Fog Computing
Published 2025-01-01“…To address challenges related to unlabeled datasets, fuzzy logic techniques are employed to generate initial trust labels for local neural network training at fog nodes. The key contributions include a privacy-preserving federated learning framework specifically tailored for robust trust evaluation in hierarchical fog computing architectures, robust fuzzy logic-based labeling enhancing interpretability and reliability in the trust assessment process, extensive empirical validations demonstrating superior prediction accuracy, computational efficiency, enhanced privacy preservation, and scalability compared to traditional centralized approaches. …”
Get full text
Article -
59
Power grid energy storage system planning method based on optimized butterfly algorithm
Published 2025-05-01“…The results showed that the research model had high stability and convergence accuracy, which was superior to comparison algorithms. When two DESS power stations were connected to nodes 4 and 32, with rated powers of 1.63 MW and 1.78 MW, and rated capacities of 5.71 MWh and 7.33 MWh, the annual benefits of capacity decision, location decision, and system were 783,000 RMB, 394,400 RMB, and 388,600 RMB, respectively. …”
Get full text
Article -
60
Research on the blockchain-based trusted ownership confirmation and value transfer system and its light weight of industrial data assets
Published 2025-06-01“…The consensus protocol algorithm of the blockchain system was optimized based on the trustworthiness of nodes, reducing the probability of malicious attacks on nodes while improving the efficiency of system transaction consensus, achieving security and lightweight parallelism of the entire system. …”
Get full text
Article