Showing 41 - 60 results of 67 for search 'superior node. Security', query time: 0.11s Refine Results
  1. 41

    Social Networks Link Prediction Based on Incremental Learning by Jian SHU, Zhichen CHEN

    Published 2025-03-01
    “…Objective Various types of relationships in social networks exist between nodes, and the number of nodes changes over time. …”
    Get full text
    Article
  2. 42
  3. 43

    Fuzzy logic based social trust computation scheme in Flying Ad-hoc network by Joydeep Kundu, Sahabul Alam, Arindam Dey

    Published 2025-03-01
    “…The Flying Ad Hoc Networks (FANETs) are becoming more popular in civic security, military, and multipurpose applications. …”
    Get full text
    Article
  4. 44

    Reinforcement Learning for Mitigating Malware Propagation in Wireless Radar Sensor Networks with Channel Modeling by Guiyun Liu, Hao Li, Lihao Xiong, Yiduan Chen, Aojing Wang, Dongze Shen

    Published 2025-04-01
    “…With the rapid development of research on Wireless Radar Sensor Networks (WRSNs), security issues have become a major challenge. Recent studies have highlighted numerous security threats in WRSNs. …”
    Get full text
    Article
  5. 45

    Cognitive intelligence routing protocol for disaster management and underwater communication system in underwater acoustic network by Kiran Saleem, Lei Wang, Ahmad Almogren, Ernest Ntizikira, Ateeq Ur Rehman, Salil Bharany, Seada Hussen

    Published 2025-03-01
    “…Abstract Future communication paradigms, such as 6G networks, emphasize self-sustainability, intelligent networking, and secure, adaptive communication. This research presents an innovative routing framework tailored for Underwater Sensor Networks (UWSNs) and Underwater Acoustic Networks (UANs), addressing critical challenges like energy constraints, security vulnerabilities, limited bandwidth, and interference. …”
    Get full text
    Article
  6. 46
  7. 47
  8. 48
  9. 49

    CAB-IoT: Continuous authentication architecture based on Blockchain for internet of things by Fatimah Hussain Al-Naji, Rachid Zagrouba

    Published 2022-06-01
    “…Moreover, mutual authentication between end-users and fog nodes is also designed, as well as secure communication between the authenticated nodes. …”
    Get full text
    Article
  10. 50

    Link stability - based optimal routing path for efficient data communication in MANET by Renisha Pulinchuvallil Salim, Rajesh Ramachandran

    Published 2024-08-01
    “…To ensure secure communication, secret keys (SK) are generated for both the Sender Node (SN) and the Receiver Node (RN) using Galois Theory. …”
    Get full text
    Article
  11. 51
  12. 52

    Analyzing cryptographic algorithm efficiency with in graph-based encryption models by Yashmin Banu, Biplab Kumar Rath, Debasis Gountia

    Published 2025-07-01
    “…Experimental results indicate that RSA demonstrates superior time efficiency and resource utilization, whereas the ElGamal algorithm exhibits greater memory efficiency and resourcefulness. …”
    Get full text
    Article
  13. 53

    A Novel FDIA Model for Virtual Power Plant Cyber–Physical Systems Based on Network Topology and DG Outputs by Shuo Wu, Junhao Gong, Shiqu Xiao, Jiajia Yang, Xiangjing Su

    Published 2025-03-01
    “…The effectiveness and superiority of the proposal are numerically verified on a 62-node cyber–physical system. …”
    Get full text
    Article
  14. 54
  15. 55

    AFF_CGE: Combined Attention-Aware Feature Fusion and Communication Graph Embedding Learning for Detecting Encrypted Malicious Traffic by Junhao Liu, Guolin Shao, Hong Rao, Xiangjun Li, Xuan Huang

    Published 2024-11-01
    “…While encryption enhances data security, it also presents significant challenges for network traffic analysis, especially in detecting malicious activities. …”
    Get full text
    Article
  16. 56
  17. 57

    Short-Block Polar-Coded Reverse and Direct Reconciliation in CV-QKD by Dingzhao Wang, Xin Liu, Chao Xu, Soon Xin Ng, Lajos Hanzo

    Published 2025-01-01
    “…Specifically, Polar codes safeguard quantum transmissions due to their superior performance for short block lengths, while LDPC codes robustly protect the classical side information exchanged over auxiliary classical channels. …”
    Get full text
    Article
  18. 58

    Federated Learning-Based Trust Evaluation With Fuzzy Logic for Privacy and Robustness in Fog Computing by Thinh Le Vinh, Huan Thien Tran, Huyen Trang Phan, Samia Le

    Published 2025-01-01
    “…To address challenges related to unlabeled datasets, fuzzy logic techniques are employed to generate initial trust labels for local neural network training at fog nodes. The key contributions include a privacy-preserving federated learning framework specifically tailored for robust trust evaluation in hierarchical fog computing architectures, robust fuzzy logic-based labeling enhancing interpretability and reliability in the trust assessment process, extensive empirical validations demonstrating superior prediction accuracy, computational efficiency, enhanced privacy preservation, and scalability compared to traditional centralized approaches. …”
    Get full text
    Article
  19. 59

    Power grid energy storage system planning method based on optimized butterfly algorithm by Xiang Yin, Xiaojun Zhang, Fuhai Cui

    Published 2025-05-01
    “…The results showed that the research model had high stability and convergence accuracy, which was superior to comparison algorithms. When two DESS power stations were connected to nodes 4 and 32, with rated powers of 1.63 MW and 1.78 MW, and rated capacities of 5.71 MWh and 7.33 MWh, the annual benefits of capacity decision, location decision, and system were 783,000 RMB, 394,400 RMB, and 388,600 RMB, respectively. …”
    Get full text
    Article
  20. 60

    Research on the blockchain-based trusted ownership confirmation and value transfer system and its light weight of industrial data assets by WANG Dongchu, FU Yusun, YU Ya

    Published 2025-06-01
    “…The consensus protocol algorithm of the blockchain system was optimized based on the trustworthiness of nodes, reducing the probability of malicious attacks on nodes while improving the efficiency of system transaction consensus, achieving security and lightweight parallelism of the entire system. …”
    Get full text
    Article