Honeypot technologies are becoming increasingly popular in cybersecurity as they offer valuable insights into adversary behavior with a low rate of false detections. By diverting the …
MA Khan, N Iqbal, H Jamil, DH Kim - Journal of Network and Computer …, 2023 - Elsevier
Traditional ML based IDS cannot handle high-speed and ever-evolving attacks. Furthermore, these traditional IDS face several common challenges, such as processing …
The number of client applications on the fog computing layer is increasing due to advancements in the Internet of Things (IoT) paradigm. Fog computing plays a significant …
Network security is essential to our daily communications and networks. Cybersecurity researchers initiate the significance of emerging proficient network intrusion detection …
AK Sangaiah, A Javadpour, P Pinto - Information Sciences, 2023 - Elsevier
Technology has enabled many devices to exchange huge amounts of data and communicate with each other as Edge Intelligence in Smart Cities (EISC), as a result of rapid …
The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as …
In this review paper, we computationally analyze a vast volume of published articles in the field of Adaptive Learning, as obtained by the Scopus Database. Particularly, we use a …
J Bellagarda, AM Abu-Mahfouz - Mathematics, 2022 - mdpi.com
As of 2022, non-fungible tokens, or NFTs, the smart contract powered tokens that represent ownership in a specific digital asset, have become a popular investment vehicle. In 2021 …
J Ding, C Zhang, D Li, J Zhan, W Li, Y Yao - Artificial Intelligence Review, 2024 - Springer
Enhancing decision-making under risks is crucial in various fields, and three-way decision (3WD) methods have been extensively utilized and proven to be effective in numerous …