This paper presents the detection and isolation of black hole attack in wireless broadband ecosystem using artificial intelligence technique. Many lit...
The growing appreciation and usage of cloud computing has heightened the need for a sound network-management practice, particularly under a dynamic an...
The increasing complexity of cyber threats has made traditional network defence mechanisms inadequate; especially in smart environments handling high-...
The rapid evolution of computer technology and networking has transformed the way individuals, organizations, and nations communicate, interact, and c...
This paper presents the development of an intranet-based staff management system with integrated instant messaging framework. The methodology employed...
This paper is targeted at improving the performance of an obstacle avoidance autonomous mobile robot using transfer learning technique. This research ...
This study addresses the critical challenge of detecting and mitigating stochastic deceptive attacks in cyber environments through a novel hybrid appr...
Multipath propagation remains a major challenge in wireless communication systems, causing signal degradation, fading, and reduced transmission reliab...
The growth of the utilization of Internet of Things (IoT) and cyber-physical systems (CPS) in the healthcare sector has come along with new vulnerabil...
This paper presents signature based detection mechanism for cloud based log management using machine learning technique. The study aimed at detecting ...
The Revamped Mean Round Robin (RMRR) CPU scheduling algorithm is an impartial scheduling algorithm that gives same time quantum to all processes. Howe...
Showing 157 to 168 of 170 papers
Publish Your Research With Us
Join our community of researchers and share your groundbreaking work with the world.