As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs) are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have …
Cyber attack detection is the process of detecting and responding to malicious or unauthorized activities in networks, computer systems, and digital environments. The …
Open RAN (ORAN or O-RAN) revolutionizes Radio Access Networks (RAN) by offering flexibility and cost-efficiency through inter-vendor equipment interoperability. More …
Cyber-attacks pose a significant challenge to the security of Internet of Things (IoT) sensor networks, necessitating the development of robust countermeasures tailored to their unique …
C Quyet Nguyen, T Thi Tran… - Journal of …, 2024 - iwaponline.com
Abstract Soil Erosion Susceptibility Mapping (SESM) is one of the practical approaches for managing and mitigating soil erosion. This study applied four Machine Learning (ML) …
Bitcoin is a digital currency that provides a way to transact without any trusted intermediary; however, privacy is an issue. Numerous deanonymization endeavors have been proposed …
Abstract The Internet of Things (IoT) network is extremely useful in many different fields, such as smart cities, the military, healthcare, business, and agriculture, among others. The …
Cybersecurity has become a major concern in the modern world due to our heavy reliance on cyber systems. Advanced automated systems utilize many sensors for intelligent decision …
Finance, supply chain, healthcare, and energy have an increasing demand for secure transactions and data exchange. Permissioned blockchains fulfilled this need thanks to the …