K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing

C Ling, W Zhang, H He - Cluster Computing, 2023 - Springer
Efficient privacy-preserving algorithms are used in internet of things (IoT) applications,
virtualization and edge computing environments to decrease the high data disclosure risk …

Combing fuzzy clustering and PSO algorithms to optimize energy consumption in WSN networks

A Javadpour, N Adelpour, G Wang… - 2018 IEEE SmartWorld …, 2018 - ieeexplore.ieee.org
In wireless sensor networks, nodes are distributed in the environment and there is no access
to replace batteries. Therefore, providing an algorithm to reduce energy consumption is a …

A network intrusion detection system in cloud computing environment using dragonfly improved invasive weed optimization integrated Shepard convolutional neural …

SS Sathiyadhas… - International Journal of …, 2022 - Wiley Online Library
In cloud computing, the resources and memory are dynamically allocated to the user based
on their needs. Security is considered as a major issue in cloud as the use of cloud is …

[HTML][HTML] A Comprehensive Survey on Cyber Deception Techniques to Improve Honeypot Performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

An optimize-aware target tracking method combining MAC layer and active nodes in wireless sensor networks

A Javadpour - Wireless Personal Communications, 2019 - Springer
Target tracking applications are very popular in wireless sensor networks (WSN) as they can
be used in industrial, healthcare, smart home, etc. This study proposes a method for …

Identifying relevant features of CSE-CIC-IDS2018 dataset for the development of an intrusion detection system

L Göcs, ZC Johanyák - Intelligent Data Analysis, 2023 - content.iospress.com
Intrusion detection systems (IDSs) are essential elements of IT systems. Their key
component is a classification module that continuously evaluates some features of the …

A Survey: An Effective Utilization of Machine Learning Algorithms in IoT Based Intrusion Detection System

B Natarajan, S Bose, N Maheswaran… - 2023 12th …, 2023 - ieeexplore.ieee.org
With tremendous advancements in technologies, the life has become easier while on other
end, security issues pose a serious threat. Cyberattacks have increased by multiple folds …

Managing heterogeneous substrate resources by mapping and visualization based on software-defined network

A Javadpour, G Wang, X Xing - 2018 IEEE Intl Conf on Parallel …, 2018 - ieeexplore.ieee.org
Network virtualization is a way to simultaneously run multiple heterogeneous architectures
on a shared substrate. The main issue in virtualization of networks is the problem of …

A scalable feature selection and opinion miner using whale optimization algorithm

A Javadpour, S Rezaei, KC Li, G Wang - Advances in Signal Processing …, 2020 - Springer
Due to the fast-growing volume of text document and reviews in recent years, current
analyzing techniques are not competent enough to meet the users' needs. Using feature …

Improve heteroscedastic discriminant analysis by using CBP algorithm

JA Alzubi, A Yaghoubi, M Gheisari, Y Qin - Algorithms and Architectures …, 2018 - Springer
Linear discriminant analysis is considered as current techniques in feature extraction so,
LDA, by discriminant information which obtains in mapping space, does the classification …