Search

Showing total 1,558 results

Search Constraints

Start Over You searched for: Topic 020206 networking & telecommunications Remove constraint Topic: 020206 networking & telecommunications Topic computer Remove constraint Topic: computer Journal ieee access Remove constraint Journal: ieee access
1,558 results

Search Results

1. A New Feedback Scheme for the State-Dependent Wiretap Channel With Noncausal State at the Transmitter

2. Research on Adaptive Relationship Between Trust and Privacy in Cloud Service

3. Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset

4. A Review of Cybersecurity Guidelines for Manufacturing Factories in Industry 4.0

5. Enabling Internet of Media Things With Edge-Based Virtual Multimedia Sensors

6. Impact of Industrial Agglomeration on Regional Economy in a Simulated Intelligent Environment Based on Machine Learning

7. Spider Monkey Crow Optimization Algorithm With Deep Learning for Sentiment Classification and Information Retrieval

8. MBCP: Performance Analysis of Large Scale Mainstream Blockchain Consensus Protocols

9. In-Network Caching for the Green Internet of Things

10. Exploring Half-Duplex Communication of NFC Read/Write Mode for Secure Multi-Factor Authentication

11. Analysis of the Architecture of the Mental Health Education System for College Students Based on the Internet of Things and Privacy Security

12. Role of Device Identification and Manufacturer Usage Description in IoT Security: A Survey

13. Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments

14. Edge Intelligence Based Identification and Classification of Encrypted Traffic of Internet of Things

15. Smart Grid Cyber-Physical Attack and Defense: A Review

16. On the Generalization and Reliability of Single Radar-Based Human Activity Recognition

17. Machine Learning Techniques for 5G and Beyond

18. Upper Limb Rehabilitation System for Stroke Survivors Based on Multi-Modal Sensors and Machine Learning

19. Anomaly Detection in IoT Networks: From Architectures to Machine Learning Transparency

20. Fitness Monitoring System Based on Internet of Things and Big Data Analysis

21. Robonomics in the 6G Era: Playing the Trust Game With On-Chaining Oracles and Persuasive Robots

22. Machine Learning for Cloud Security: A Systematic Review

23. Contract-Less Mobile Data Access Beyond 5G: Fully-Decentralized, High-Throughput and Anonymous Asset Trading Over the Blockchain

24. Advances in the Design Techniques and Applications of Chipless RFIDs

25. Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network

26. Multi-Source Transfer Network for Cross Domain Person Re-Identification

27. Why is Internet of Autonomous Vehicles not as Plug and Play as We Think ? Lessons to Be Learnt From Present Internet and Future Directions

28. A Prediction Method of Peak Time Popularity Based on Twitter Hashtags

29. SMSH: Secure Surveillance Mechanism on Smart Healthcare IoT System With Probabilistic Image Encryption

30. AATMS: An Anti-Attack Trust Management Scheme in VANET

31. cRetor: An SDN-Based Routing Scheme for Data Centers With Regular Topologies

32. Ciphertext-Policy Hierarchical Attribute-Based Encryption Against Key-Delegation Abuse for IoT-Connected Healthcare System

33. Newly Emerging Nature-Inspired Optimization - Algorithm Review, Unified Framework, Evaluation, and Behavioural Parameter Optimization

34. Trust and Reputation in the Internet of Things: State-of-the-Art and Research Challenges

35. A Novel Blockchain-Based Framework for Vehicle Life Cycle Tracking: An End-to-End Solution

36. Social Interaction Assisted Resource Sharing Scheme for Device-to-Device Communication Towards Green Internet of Things

37. A Coverage-Based Location Approach and Performance Evaluation for the Deployment of 5G Base Stations

38. Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric

39. Mobile Privacy: Scalable Ensemble Matching for User Identification Attacks

40. Road Anomaly Detection Through Deep Learning Approaches

41. Attacks on Self-Driving Cars and Their Countermeasures: A Survey

42. A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions

43. Research Trends in Enterprise Service Bus (ESB) Applications: A Systematic Mapping Study

44. A Mechanism to Resolve the Unauthorized Access Vulnerability Caused by Permission Delegation in Blockchain-Based Access Control

45. A Comprehensive Analysis of the Android Permissions System

46. Health Monitoring Based on Internet of Medical Things: Architecture, Enabling Technologies, and Applications

47. TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems

48. IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space

49. Immune System Based Intrusion Detection System (IS-IDS): A Proposed Model

50. An Empirical Study on System Level Aspects of Internet of Things (IoT)