ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by utilising communication networks, is a complex intelligent control system with high flexibility …
Computational intelligence (CI), including artificial neural network, fuzzy logic, and evolutionary computation (EC), has rapidly developed nowadays. Especially, EC is a kind of …
The world of the Internet and networking is exposed to many cyber-attacks and threats. Over the years, machine learning models have progressed to be integrated into many scenarios …
A Forestiero - Knowledge-Based Systems, 2021 - Elsevier
Detecting unusual data, activities and user behaviors is an extremely important task to acquire relevant security information that allow identifying faults, intrusions and system …
MA Hassan, S Ali, M Imad, S Bibi - Big Data Analytics and Computational …, 2022 - Springer
World is now considered as global village because of interconnected networks. Smart phones and large computing devices exchange millions of information each day. Information …
Electric Vehicles (EVs) are beginning to play a key role in the fast developing area of Internet of Things (IoT). Numerous results have shown the feasibility of vehicle-to-building …
MD Hina, A Soukane, A Ramdane-Cherif - Innovative trends in …, 2022 - Springer
Computational intelligence refers to the ability of a computing device or machine to learn specific tasks based on its data and experience. Computational intelligence is invoked as an …
HM Al-Saadi, I Alshawi - Informatica, 2023 - informatica.si
Lightweight cryptography algorithms have concentrated on key generation's randomness, unpredictable nature, and complexity to improve the resistance of ciphers. Therefore, the key …
How to design an effective and secure user authentication scheme suitable for complex wireless sensor network (WSN) environments has very important research significance …