UP - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 381
1.
  • IoT malicious traffic ident... IoT malicious traffic identification using wrapper-based feature selection mechanisms
    Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif ... Computers & security, July 2020, 2020-07-00, 20200701, Letnik: 94
    Journal Article
    Recenzirano
    Odprti dostop

    Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied ...
Celotno besedilo
2.
  • Performance Analysis of FD-... Performance Analysis of FD-NOMA-Based Decentralized V2X Systems
    Zhang, Di; Liu, Yuanwei; Dai, Linglong ... IEEE transactions on communications, 07/2019, Letnik: 67, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    In order to meet the requirements of massively connected devices, different quality of services (QoS), various transmit rates, and ultra-reliable and low latency communications (URLLC) in ...
Celotno besedilo

PDF
3.
  • A Critical Cybersecurity An... A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review
    Tariq, Usman; Ahmed, Irfan; Bashir, Ali Kashif ... Sensors (Basel, Switzerland), 04/2023, Letnik: 23, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    The emergence of the Internet of Things (IoT) technology has brought about tremendous possibilities, but at the same time, it has opened up new vulnerabilities and attack vectors that could ...
Celotno besedilo
4.
  • CorrAUC: A Malicious Bot-Io... CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
    Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif ... IEEE internet of things journal, 03/2021, Letnik: 8, Številka: 5
    Journal Article
    Odprti dostop

    Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this ...
Celotno besedilo

PDF
5.
  • Energy-Aware Marine Predato... Energy-Aware Marine Predators Algorithm for Task Scheduling in IoT-Based Fog Computing Applications
    Abdel-Basset, Mohamed; Mohamed, Reda; Elhoseny, Mohamed ... IEEE transactions on industrial informatics, 07/2021, Letnik: 17, Številka: 7
    Journal Article

    To improve the quality of service (QoS) needed by several applications areas, the Internet of Things (IoT) tasks are offloaded into the fog computing instead of the cloud. However, the availability ...
Celotno besedilo
6.
  • Fuzzy Detection System for ... Fuzzy Detection System for Rumors Through Explainable Adaptive Learning
    Guo, Zhiwei; Yu, Keping; Jolfaei, Alireza ... IEEE transactions on fuzzy systems, 2021-Dec., 2021-12-00, Letnik: 29, Številka: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Nowadays, rumor spreading has gradually evolved into a kind of organized behaviors, accompanied with strong uncertainty and fuzziness. However, existing fuzzy detection techniques for rumors focused ...
Celotno besedilo
7.
  • KeyLight: Intelligent Traff... KeyLight: Intelligent Traffic Signal Control Method Based on Improved Graph Neural Network
    Sun, Yi; Lin, Kaixiang; Bashir, Ali Kashif IEEE transactions on consumer electronics, 02/2024, Letnik: 70, Številka: 1
    Journal Article
    Recenzirano

    Graph neural network combined with reinforcement learning is one of the most effective traffic signal control methods. However, existing methods fail to pay enough attention to the key information, ...
Celotno besedilo
8.
  • Efficient and Secure Data S... Efficient and Secure Data Sharing for 5G Flying Drones: A Blockchain-Enabled Approach
    Feng, Chaosheng; Yu, Keping; Bashir, Ali Kashif ... IEEE network, 01/2021, Letnik: 35, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The drone's open and untrusted environment may create problems for authentication and data sharing. To address this issue, we propose a blockchain-enabled efficient and secure data sharing model for ...
Celotno besedilo
9.
  • A metaheuristic optimizatio... A metaheuristic optimization approach for energy efficiency in the IoT networks
    Iwendi, Celestine; Maddikunta, Praveen Kumar Reddy; Gadekallu, Thippa Reddy ... Software, practice & experience, December 2021, 2021-12-00, 20211201, Letnik: 51, Številka: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Summary Recently Internet of Things (IoT) is being used in several fields like smart city, agriculture, weather forecasting, smart grids, waste management, etc. Even though IoT has huge potential in ...
Celotno besedilo

PDF
10.
  • Data mining and machine lea... Data mining and machine learning methods for sustainable smart cities traffic classification: A survey
    Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif ... Sustainable cities and society, September 2020, 2020-09-00, Letnik: 60
    Journal Article
    Recenzirano
    Odprti dostop

    •This paper study Data Mining and Machine Learning Methods for Sustainable Smart Cities Traffic Classification: A Survey.•This survey paper describes the significant literature survey of Sustainable ...
Celotno besedilo
1 2 3 4 5
zadetkov: 381

Nalaganje filtrov