Enhancing Traffic Routing Inside a Network through IoT Technology & Network Clustering by Selecting Smart Leader Nodes Radwan S.Abujassar, Arab Open University Kuwait, Kuwait |
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered Feature Selection with ML Model for IoT Threats & Attack Detection J. I. Christy Eunaicy1, C. Jayapratha2 and H.Salome Hemachitra3, 1Thiagarajar College, India, 2Karpaga Vinayaga College of Engineering and Technology, India, 3Sri Meenakshi Government College of Arts for Women, India |
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic Abderezak Touzene, Ahmed Al Farsi and Nasser Al Zeidi, Sultan Qaboos University, Oman |
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection P Sumalatha and G.S. Mahalakshmi, Anna University, India
|
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems Ali Muayed Fadhil1,2, Norashidah Md Din1, Norazizah Binti Mohd Aripin1 and Ali Ahmed Abed2, 1University Tenaga Nasional, Malaysia, 2University of Basrah, Iraq
|
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy Commitment
Stanley Mlato1,Yesaya Gabriel1, Prince Chirwa1 and Hyunsung Kim1,2, 1University of Malawi, Malawi, 2Kyungil University, Korea |
A Topology Control Algorithm Taking into Account Energy and Quality of Transmission for Software-Defined Wireless Sensor Network Hong Thi Chu Hai1, Le Huu Binh2 and Le Duc Huy3, 1Banking Academy of Vietnam, Vietnam, 2Hue University, Vietnam, 3Ha Noi University of Business and Technology, Vietnam |
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless Body Area Networks Nabila Azdad and Mohamed Elboukhari, Mohammed First University, Morocco |
Secure Supervised Learning-Based Smart Home Authentication Framework K. Swapna Sudha1, N. Jeyanthi1, and Celestine Iwendi2, 1Vellore Institute of Technology, India 2University of Bolton, UK |
Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion Detection Trong Thua Huynh, Hoang Thanh Nguyen, Posts and Telecommunications Institute of Technology, Vietnam |
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks Kanneboina Ashok and Gopikrishnan S, VIT-AP University, India |
Feature Selection using the Concept of Peafowl Mating in IDS Partha Ghosh, Joy Sharma and Nilesh Pandey, Netaji Subhash Engineering College, India |
Sensing Time Improvement using Two Stage Detectors for Cognitive Radio System Mohamed Khalaf1, Ahmed Fawzi1 and Ahmed Yahya2, 1Modern Academy for Engineering and Technology, Maadi, Egypt, 2Al-Azhar University, Cairo, Egypt |
Comparative Study of Orchestration using gRPC API and REST API in Server Creation Time: An Openstack Case Hari Krishna S M and Rinki Sharma, M. S. Ramaiah University of Applied Sciences, India |
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocation in Fog-Cloud Environments Ahmed A. A. Gad-Elrab1,2, Almohammady S. Alsharkawy1, Mahmoud E. Embabi1, Ahmed Sobhi1,3, Farouk A. Emara1, 1Al-Azhar University, Cairo, Egypt, 2King Abdulaziz University, Jeddah, Saudi Arabia, 3AlRyada University for Science and Technology (RST), Egypt |
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimized Link State Routing-Based for VANET Waleed Khalid Ahmed, Mohd Nazri bin Mohd Warip, Mohamed Elshaikh Elobaid Said Ahmed and Phaklen Ehkan, Universiti Malaysia Perlis, Malaysia |