Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 3,257
1.
  • IoT malicious traffic ident... IoT malicious traffic identification using wrapper-based feature selection mechanisms
    Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif ... Computers & security, July 2020, 2020-07-00, 20200701, Volume: 94
    Journal Article
    Peer reviewed
    Open access

    Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
2.
  • Numerical study and chaotic... Numerical study and chaotic oscillations for aerodynamic model of wind turbine via fractal and fractional differential operators
    Abro, Kashif Ali Numerical methods for partial differential equations, September 2022, Volume: 38, Issue: 5
    Journal Article
    Peer reviewed

    The aeroelastic analysis has become important for aerodynamical model of wind turbine in predicting the wind turbine; such phenomenon is based on aerodynamic performance to have accuracy and ...
Full text
Available for: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
3.
  • Performance Analysis of FD-... Performance Analysis of FD-NOMA-Based Decentralized V2X Systems
    Zhang, Di; Liu, Yuanwei; Dai, Linglong ... IEEE transactions on communications, 07/2019, Volume: 67, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    In order to meet the requirements of massively connected devices, different quality of services (QoS), various transmit rates, and ultra-reliable and low latency communications (URLLC) in ...
Full text
Available for: IJS, NUK, UL

PDF
4.
  • Mathematical analysis of me... Mathematical analysis of memristor through fractal‐fractional differential operators: A numerical study
    Abro, Kashif Ali; Atangana, Abdon Mathematical methods in the applied sciences, 15 July 2020, Volume: 43, Issue: 10
    Journal Article
    Peer reviewed

    The newly generalized energy storage component, namely, memristor, which is a fundamental circuit element so called universal charge‐controlled mem‐element, is proposed for controlling the analysis ...
Full text
Available for: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
5.
  • Numerical and mathematical ... Numerical and mathematical analysis of induction motor by means of AB–fractal–fractional differentiation actuated by drilling system
    Abro, Kashif Ali; Atangana, Abdon Numerical methods for partial differential equations, 20/May , Volume: 38, Issue: 3
    Journal Article
    Peer reviewed

    The quality of electric induction motors for its high number of applications can be compared with traditional motor for the check of accuracy of physical and psychological discomforts. A mathematical ...
Full text
Available for: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
6.
  • A Critical Cybersecurity An... A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review
    Tariq, Usman; Ahmed, Irfan; Bashir, Ali Kashif ... Sensors (Basel, Switzerland), 04/2023, Volume: 23, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    The emergence of the Internet of Things (IoT) technology has brought about tremendous possibilities, but at the same time, it has opened up new vulnerabilities and attack vectors that could ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
7.
  • CorrAUC: A Malicious Bot-Io... CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
    Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif ... IEEE internet of things journal, 03/2021, Volume: 8, Issue: 5
    Journal Article
    Open access

    Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this ...
Full text
Available for: IJS, NUK, UL

PDF
8.
  • Energy-Aware Marine Predato... Energy-Aware Marine Predators Algorithm for Task Scheduling in IoT-Based Fog Computing Applications
    Abdel-Basset, Mohamed; Mohamed, Reda; Elhoseny, Mohamed ... IEEE transactions on industrial informatics, 07/2021, Volume: 17, Issue: 7
    Journal Article

    To improve the quality of service (QoS) needed by several applications areas, the Internet of Things (IoT) tasks are offloaded into the fog computing instead of the cloud. However, the availability ...
Full text
Available for: IJS, NUK, UL
9.
  • Digital Information Literac... Digital Information Literacy Skills among Library and Information Science Professionals in University Libraries of Sindh Pakistan
    Ali, Kashif Journal of Information Management and Practices, 07/2022, Volume: 2, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    This study aims to prevail the digital information literacy skills among library and information professionals working in different universities of Sindh, Pakistan. For data collection, survey ...
Full text
Available for: NUK, UL, UM, UPUK
10.
  • Electrochemical detection a... Electrochemical detection and removal of brilliant blue dye via photocatalytic degradation and adsorption using phyto-synthesized nanoparticles
    Khan, Kashif Ali; Shah, Afzal; Nisar, Jan RSC advances, 01/2024, Volume: 14, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Herein, we report a sensitive electrochemical platform prepared by modifying the electrode surface with copper-doped zinc oxide nanoparticles; these nanoparticles were prepared a green synthetic ...
Full text
Available for: IJS, KILJ, NUK, UL, UM, UPUK
1 2 3 4 5
hits: 3,257

Load filters