[HTML][HTML] Rule-based system with machine learning support for detecting anomalies in 5G WLANs

K Uszko, M Kasprzyk, M Natkaniec, P Chołda - Electronics, 2023 - mdpi.com
The purpose of this paper is to design and implement a complete system for monitoring and
detecting attacks and anomalies in 5G wireless local area networks. Regrettably, the …

[HTML][HTML] Localization and Sizing of Distributed Generation through a Genetic Algorithm to Improve Voltage Profile Using Ecuadorian Standards

D Calvachi, L Tipán, M Jaramillo - Energies, 2023 - mdpi.com
The approach proposed for the development of this research work was based on the
integration of Distributed Energy Generation (DG) into an energy distribution network …

[HTML][HTML] Remaining Useful Life Prediction for a Catenary, Utilizing Bayesian Optimization of Stacking

L Liu, Z Zhang, Z Qu, A Bell - Electronics, 2023 - mdpi.com
This article addresses the problem that the remaining useful life (RUL) prediction accuracy
for a high-speed rail catenary is not accurate enough, leading to costly and time-consuming …

Cooperative hybrid-NOMA/Dynamic SWIPT-pairing mechanism for 6G THz communications

HW Oleiwi, H Al-Raweshidy - 2023 5th Global Power, Energy …, 2023 - ieeexplore.ieee.org
The simultaneous wireless information and power transfer (SWIPT) technique is adopted to
alleviate the coverage limitation of terahertz (THz) communications and increase spectral …

Enhancing Resilience in Next-Generation Wireless Networks Through Deep Learning for Security Enhancement

EB Ashary, LA Maghrabi, S Jambi… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Safeguarding strong protection and efficient intrusion recognition are important reflections in
the growth and protection of Next-Generation Wireless Networks. These original networks …

[HTML][HTML] Predicting DoS and DDoS attacks in network security scenarios using a hybrid deep learning model

AF Al-zubidi, AK Farhan, SM Towfek - Journal of Intelligent Systems, 2024 - degruyter.com
Network security faces increasing threats from denial of service (DoS) and distributed denial
of service (DDoS) attacks. The current solutions have not been able to predict and mitigate …

A Secure Deep Autoencoder-based 6G Channel Estimation to Detect/Mitigate Adversarial Attacks

HW Oleiwi, DN Mhawi… - 2023 5th Global Power …, 2023 - ieeexplore.ieee.org
Channel estimation (CE) is critical in wireless communications. However, it is vulnerable to
adversarial attacks (AA) that are associated with the incorporated artificial intelligence (AI) …

Machine Learning Algorithms to Detect Attacks in Wireless Sensor Networks

N Jagwani, G Poornima - International Journal of Intelligent Systems and …, 2024 - ijisae.org
A network of independent and interconnected sensor nodes that communicate with each
other wirelessly to collect, process, and transmit data from the environment they are …