In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and …
With large scale generation and exchange of data between IoT devices and constrained IoT security to protect data communication, it becomes easy for attackers to compromise data …
A city-wide communication network capable of supporting a range of applica-tions should be established through the use of wireless sensor networks that collect, analyze, and act on …
Mobile ad hoc networks are the “spontaneous networks” which create a temporary network in any place and any time without using any extra fixed radio device of a full infrastructure …
The continuous rise in the adoption of emerging technologies such as Internet of Things (IoT) by businesses has brought unprecedented opportunities for innovation and growth …
MANET (mobile ad-hoc networks) are distributed or delegated away from a central server, authoritative location of wireless networks that communicate without pre-existing structure …
Y Li, J Liu, J Ren, Y Chang - IEEE Access, 2020 - ieeexplore.ieee.org
Rating predictions, as an application that is widely used in recommender systems, have gradually become a valuable way which can help user narrow down their choices quickly …
Mobile ad hoc networks (MANETs) become most vibrant and are widely used in various applications, including military, commercial sectors, and personal area networks. However …
Mobile ad hoc networks have surged in popularity in recent years and are now widely regarded as critically important due to their low complexity and quick expansion. However, a …