Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 421
1.
  • IoT malicious traffic ident... IoT malicious traffic identification using wrapper-based feature selection mechanisms
    Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif ... Computers & security, July 2020, 2020-07-00, 20200701, Letnik: 94
    Journal Article
    Recenzirano
    Odprti dostop

    Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
2.
  • Performance Analysis of FD-... Performance Analysis of FD-NOMA-Based Decentralized V2X Systems
    Zhang, Di; Liu, Yuanwei; Dai, Linglong ... IEEE transactions on communications, 07/2019, Letnik: 67, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    In order to meet the requirements of massively connected devices, different quality of services (QoS), various transmit rates, and ultra-reliable and low latency communications (URLLC) in ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
3.
  • CorrAUC: A Malicious Bot-Io... CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
    Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif ... IEEE internet of things journal, 03/2021, Letnik: 8, Številka: 5
    Journal Article
    Odprti dostop

    Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
4.
  • Energy-Aware Marine Predato... Energy-Aware Marine Predators Algorithm for Task Scheduling in IoT-Based Fog Computing Applications
    Abdel-Basset, Mohamed; Mohamed, Reda; Elhoseny, Mohamed ... IEEE transactions on industrial informatics, 07/2021, Letnik: 17, Številka: 7
    Journal Article

    To improve the quality of service (QoS) needed by several applications areas, the Internet of Things (IoT) tasks are offloaded into the fog computing instead of the cloud. However, the availability ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
5.
  • Fuzzy Detection System for ... Fuzzy Detection System for Rumors Through Explainable Adaptive Learning
    Guo, Zhiwei; Yu, Keping; Jolfaei, Alireza ... IEEE transactions on fuzzy systems, 2021-Dec., 2021-12-00, Letnik: 29, Številka: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Nowadays, rumor spreading has gradually evolved into a kind of organized behaviors, accompanied with strong uncertainty and fuzziness. However, existing fuzzy detection techniques for rumors focused ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
6.
  • KeyLight: Intelligent Traff... KeyLight: Intelligent Traffic Signal Control Method Based on Improved Graph Neural Network
    Sun, Yi; Lin, Kaixiang; Bashir, Ali Kashif IEEE transactions on consumer electronics, 02/2024, Letnik: 70, Številka: 1
    Journal Article
    Recenzirano

    Graph neural network combined with reinforcement learning is one of the most effective traffic signal control methods. However, existing methods fail to pay enough attention to the key information, ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
7.
  • Efficient and Secure Data S... Efficient and Secure Data Sharing for 5G Flying Drones: A Blockchain-Enabled Approach
    Feng, Chaosheng; Yu, Keping; Bashir, Ali Kashif ... IEEE network, 01/2021, Letnik: 35, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The drone's open and untrusted environment may create problems for authentication and data sharing. To address this issue, we propose a blockchain-enabled efficient and secure data sharing model for ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
8.
  • A metaheuristic optimizatio... A metaheuristic optimization approach for energy efficiency in the IoT networks
    Iwendi, Celestine; Maddikunta, Praveen Kumar Reddy; Gadekallu, Thippa Reddy ... Software, practice & experience, December 2021, 2021-12-00, 20211201, Letnik: 51, Številka: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Summary Recently Internet of Things (IoT) is being used in several fields like smart city, agriculture, weather forecasting, smart grids, waste management, etc. Even though IoT has huge potential in ...
Celotno besedilo
Dostopno za: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK

PDF
9.
  • Data mining and machine lea... Data mining and machine learning methods for sustainable smart cities traffic classification: A survey
    Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif ... Sustainable cities and society, September 2020, 2020-09-00, Letnik: 60
    Journal Article
    Recenzirano
    Odprti dostop

    •This paper study Data Mining and Machine Learning Methods for Sustainable Smart Cities Traffic Classification: A Survey.•This survey paper describes the significant literature survey of Sustainable ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
10.
  • A review on classification ... A review on classification of imbalanced data for wireless sensor networks
    Patel, Harshita; Singh Rajput, Dharmendra; Thippa Reddy, G ... International Journal of Distributed Sensor Networks, 04/2020, Letnik: 16, Številka: 4
    Book Review, Journal Article
    Recenzirano
    Odprti dostop

    Classification of imbalanced data is a vastly explored issue of the last and present decade and still keeps the same importance because data are an essential term today and it becomes crucial when ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
1 2 3 4 5
zadetkov: 421

Nalaganje filtrov