The four dimensions of social network analysis: An overview of research methods, applications, and software tools

D Camacho, A Panizo-LLedot, G Bello-Orgaz… - Information …, 2020 - Elsevier
… study to detect the most active research areas and … of methods and techniques based on
the concepts previously published. For example, it should be noted that community detection

Machine learning enabled techniques for protecting wireless sensor networks by estimating attack prevalence and device deployment strategy for 5G networks

P Kumar, A Baliyan, KR Prasad… - Wireless …, 2022 - Wiley Online Library
computer network, while metropolitan area networks (MAN) are the most common type of
wide area network (… This paper offers a detection method for DDoS assaults in SDN in order to …

Federated deep learning for zero-day botnet attack detection in IoT-edge devices

SI Popoola, R Ande, B Adebisi, G Gui… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
… (FDL) method for zero-day botnet attack detection to avoid data privacy leakage in IoT-edge
devices. In this method, an optimal deep neural network (DNN) architecture is employed for …

Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices

M Eskandari, ZH Janjua, M Vecchio… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
devices to create wide-scale malicious botnets. These are literally “networks of bots,” ie,
compromised computing devices … It provides a number of features for probing computer networks

[HTML][HTML] Federated learning for malware detection in IoT devices

V Rey, PMS Sánchez, AH Celdrán, G Bovet - Computer Networks, 2022 - Elsevier
… security in mind, making them vulnerable to a wide variety of malware. In these scenarios,
traditional AI-based detection approaches are not suitable due to the impossibility of training …

Community detection in node-attributed social networks: a survey

P Chunaev - Computer Science Review, 2020 - Elsevier
… propose for community detection methods under consideration. In Section 5, we discuss
the most popular datasets and quality measures for evaluation of community detection results. …

Cellular, wide-area, and non-terrestrial IoT: A survey on 5G advances and the road toward 6G

M Vaezi, A Azari, SR Khosravirad… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
… These devices are more and more going to connect to nonterrestrial, cellular, and wide
area networks. Furthermore, 6G IoT may include uses cases that are not captured by the 5G …

An edge traffic flow detection scheme based on deep learning in an intelligent transportation system

C Chen, B Liu, S Wan, P Qiao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
network bandwidth when the massive data are transmitted to the cloud across the wide area
network (… of the traffic flow detection algorithm implemented on the edge device Jetson TX2. …

A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions

J Asharf, N Moustafa, H Khurshid, E Debie, W Haider… - Electronics, 2020 - mdpi.com
… of network threats from IoT networks and their devices with … of low-rate wireless personal
area networks (LR-WPANs). It … as a neighbor to many nodes, even the complete network by …

AI and 6G security: Opportunities and challenges

Y Siriwardhana, P Porambage… - … on Networks and …, 2021 - ieeexplore.ieee.org
… of future networks demands proactive threats discovery, … to wide area network security would
be a better approach in 6G… approach in future networks for resourceconstrained devices. In …