A Alotaibi, A Barnawi - Arabian Journal for Science and Engineering, 2024 - Springer
IoT traffic on access networks is expected to increase significantly with the advent of 6G- enabled massive IoT networks. Nevertheless, current intrusion detection system (IDS) …
Consumer-centric Internet of Things (CIoT) will play a pivotal role in the fifth industrial revolution (Industry 5.0) but it exhibits vulnerabilities that can render it susceptible to various …
The future generation of mobile networks envision Artificial Intelligence (AI) and the Internet of Things (IoT) as key enabling technologies that will foster the emergence of sophisticated …
Distributed denial of service (DDoS) is an awful cyber threat, becoming more prevalent with mature heterogeneous IoT (HetIoT) applications like intelligent agriculture, wearables, and …
RN Alief, MAP Putra, A Gohil, JM Lee… - … Conference on Artificial …, 2023 - ieeexplore.ieee.org
The usage of the federated learning (FL) concept in the artificial intelligence (AI) field has increased. The main concept of FL is to tackle the centralized-based approach, which …
J Deepthy, N Radhika, A Denny - 2024 Third International …, 2024 - ieeexplore.ieee.org
The availability of online resource is seriously threatened by the fatal DDoS (Distributed Denial of Service) attacks, which can earnestly break up a targeted network or website by …
Q Deng, N Liao - Available at SSRN 4820781 - papers.ssrn.com
In order to meet the challenges of traffic analysis in distributed network environment and improve data utilization efficiency while protecting user privacy, this study innovatively …
Malware is an envelope of various malicious software or programs which hackers use to harm and attack computer systems. Malware detection is the procedure of identifying the …
Recently Unmanned aerial vehicles (UAVs), or drones, have recently drawn greater scrutiny as a result of their expanding applications in surveillance, logistics, monitoring, and …