S Patil, S Chaudhari - Procedia Computer Science, 2016 - Elsevier
Abstract Wireless Sensor Networks (WSN) has wide applications in data gathering and data transmission via wireless networks. Due to the weaknesses in the WSN, the sensor nodes …
R Mao, R Cui, CLP Chen - IEEE Transactions on Neural …, 2021 - ieeexplore.ieee.org
Broad learning systems (BLSs) have attracted considerable attention due to their powerful ability in efficient discriminative learning. In this article, a modified BLS with reinforcement …
X Huang, Y Wu - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are prone to attack due to open work conditions and broadcast communication. The selective forwarding attack, one of the inner attacks in WSNs …
Security is a crucial factor in Mobile Ad hoc Networks (MANET) where inaccessible environments cause assorted categories of security intimidations to provide the malicious …
Spectrum scarcity is the principal motivation behind the development of cognitive radio. This technology introduces new functionalities at the physical, medium access control, and …
Abstract Network Intrusion Detection is the process of monitoring the events occurring in a computer system or the network and analyzing them for the signs of possible intrusions. An …
In the light of Industry 4.0 revolution, the Industrial Internet of Things (IIoT) allows digitalizing manufacturing processes and increasing the digital connectivity and automation in the smart …
Outlier detection (OD) constitutes an important issue for many research areas namely data mining, medicines, and sensor networks. It is helpful mainly in identifying intrusion, fraud …
We present a project management methodology designed for the selection of wind turbines wake effect most influential parameters, who need to run wind farm project for large energy …