A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

Quantum internet protocol stack: A comprehensive survey

J Illiano, M Caleffi, A Manzalini, AS Cacciapuoti - Computer Networks, 2022 - Elsevier
Classical Internet evolved exceptionally during the last five decades, from a network
comprising a few static nodes in the early days to a leviathan interconnecting billions of …

A survey on mobility in wireless sensor networks

N Temene, C Sergiou, C Georgiou, V Vassiliou - Ad Hoc Networks, 2022 - Elsevier
Abstract As Wireless Sensor Networks (WSNs) and Internet of Things (IoTs) applications
evolve, the need for robust protocols, capable to guarantee extended lifetime and high …

[图书][B] Artificial neural network architectures and training processes

Artificial Neural Network Architectures and Training Processes | SpringerLink Skip to main
content Advertisement SpringerLink Account Menu Find a journal Publish with us Track your …

An exhaustive survey on p4 programmable data plane switches: Taxonomy, applications, challenges, and future trends

EF Kfoury, J Crichigno, E Bou-Harb - IEEE access, 2021 - ieeexplore.ieee.org
Traditionally, the data plane has been designed with fixed functions to forward packets using
a small set of protocols. This closed-design paradigm has limited the capability of the …

Scheduling Internet of Things requests to minimize latency in hybrid Fog–Cloud​ computing

RO Aburukba, M AliKarrar, T Landolsi… - Future Generation …, 2020 - Elsevier
Delivering services for Internet of Things (IoT) applications that demand real-time and
predictable latency is a challenge. Several IoT applications require stringent latency …

Adversarial learning targeting deep neural network classification: A comprehensive review of defenses against attacks

DJ Miller, Z Xiang, G Kesidis - Proceedings of the IEEE, 2020 - ieeexplore.ieee.org
With wide deployment of machine learning (ML)-based systems for a variety of applications
including medical, military, automotive, genomic, multimedia, and social networking, there is …

[图书][B] Understanding Bitcoin: Cryptography, engineering and economics

P Franco - 2014 - books.google.com
Discover Bitcoin, the cryptocurrency that has the finance world buzzing Bitcoin is arguably
one of the biggest developments in finance since the advent of fiat currency. With …

Future space networks: Toward the next giant leap for humankind

MY Abdelsadek, AU Chaudhry… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Due to the unprecedented advances in satellite fabrication and deployment, innovative
communications and networking technologies, ambitious space projects and programs, and …

A conceptual framework to evaluate human-robot collaboration

R Gervasi, L Mastrogiacomo, F Franceschini - The International Journal of …, 2020 - Springer
Abstract Human-Robot Collaboration (HRC) is a form of direct interaction between humans
and robots. The objective of this type of interaction is to perform a task by combining the …