Accurate LPI Radar Waveform Recognition With CWD-TFA for Deep Convolutional Network | 1 | 0.35 | 2021 |
Prioritized-MAC Model for Intelligent UAV-to-BS Communication in Industrial-WSN Systems | 0 | 0.34 | 2021 |
Analysis And Prediction Of Hourly Energy Consumption Based On Long Short-Term Memory Neural Network | 0 | 0.34 | 2021 |
Hybrid MAC Protocol for UAV-Assisted Data Gathering in a Wireless Sensor Network | 0 | 0.34 | 2021 |
Evaluating The Effectiveness Of Shuffle And Redundancy Mtd Techniques In The Cloud | 0 | 0.34 | 2021 |
Task Priority-Based Resource Allocation Algorithm For Task Offloading In Fog-Enabled Iot Systems | 0 | 0.34 | 2021 |
IoT-Based Vibration Sensor Data Collection and Emergency Detection Classification using Long Short Term Memory (LSTM) | 1 | 0.35 | 2021 |
On the Performance Evaluations of Cooperative Retransmission Scheme for Cell-Edge Users of URLLC in Multi-Carrier Downlink NOMA Systems | 0 | 0.34 | 2021 |
Edge Ai Prospect Using The Neuroedge Computing System: Introducing A Novel Neuromorphic Technology | 0 | 0.34 | 2021 |
Decentralized Latency-aware Edge Node Grouping with Fault Tolerance for Internet of Battlefield Things | 0 | 0.34 | 2020 |
3GPP Release-16 for Industrial Internet of Things and Mission Critical Communications | 0 | 0.34 | 2020 |
Anti-Drone System: A Visual-based Drone Detection using Neural Networks | 0 | 0.34 | 2020 |
Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense | 1 | 0.36 | 2020 |
Distributed Computing Architecture for Logistic Job Allocation in Smart Factory | 0 | 0.34 | 2020 |
Adaptive Essential Matrix Based Stereo Visual Odometry with Joint Forward-Backward Translation Estimation. | 0 | 0.34 | 2020 |
Tactical Remodeling of Unrecoverable Packets in MIL-STD-1553 Network-bus for Industrial-IoBT | 0 | 0.34 | 2020 |
Integrated Proactive Defense for Software Defined Internet of Things under Multi-Target Attacks | 0 | 0.34 | 2020 |
Optimal Sensing and Interference Suppression in 5G Cognitive Radio Networks. | 0 | 0.34 | 2020 |
Attack Graph-Based Moving Target Defense in Software-Defined Networks | 1 | 0.39 | 2020 |
Double Deep Q-Learning Based Channel Estimation for Industrial Wireless Networks | 0 | 0.34 | 2020 |
Learning Geometric Features with Dual-stream CNN for 3D Action Recognition. | 0 | 0.34 | 2020 |
Multi-shuffled Convolutional Blocks for Low-complex Modulation Recognition | 0 | 0.34 | 2020 |
Bio-inspired Relay Selection Algorithm Using Finite Blocklength Regime for URLLC | 0 | 0.34 | 2020 |
IoT-Based HVAC Monitoring System for Smart Factory | 0 | 0.34 | 2020 |
A Novel Graphical Security Model for Evolving Cyber Attacks in Internet of Things | 0 | 0.34 | 2020 |
Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms | 0 | 0.34 | 2020 |
Evaluation of a Backup-as-a-Service Environment for Disaster Recovery | 0 | 0.34 | 2019 |
Systematic identification of threats in the cloud: A survey. | 3 | 0.39 | 2019 |
An Automated Security Analysis Framework and Implementation for Cloud. | 0 | 0.34 | 2019 |
Malware Detection with Malware Images using Deep Learning Techniques | 1 | 0.35 | 2019 |
Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks | 0 | 0.34 | 2019 |
SAGA: Secure Auto-Configurable Gateway Architecture for Smart Home | 0 | 0.34 | 2019 |
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks | 1 | 0.35 | 2019 |
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing | 0 | 0.34 | 2019 |
Security and Performance Modeling and Optimization for Software Defined Networking | 0 | 0.34 | 2019 |
SDN-Based IP Shuffling Moving Target Defense with Multiple SDN Controllers | 2 | 0.36 | 2019 |
A Hardware Implementation of SHA3 Hash Processor using Cortex-M0 | 1 | 0.39 | 2019 |
Comprehensive Security Assessment of Combined MTD Techniques for the Cloud. | 2 | 0.40 | 2018 |
Dynamic security metrics for measuring the effectiveness of moving target defense techniques. | 0 | 0.34 | 2018 |
Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud | 0 | 0.34 | 2018 |
A systematic evaluation of cybersecurity metrics for dynamic networks. | 0 | 0.34 | 2018 |
Android Malware Detection Using Feature Selections and Random Forest | 0 | 0.34 | 2018 |
Stateless Security Risk Assessment for Dynamic Networks | 0 | 0.34 | 2018 |
A framework for automating security analysis of the internet of things. | 25 | 0.85 | 2017 |
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches | 0 | 0.34 | 2017 |
Discovering and Mitigating New Attack Paths Using Graphical Security Models | 0 | 0.34 | 2017 |
Security Modeling And Analysis Of Cross-Protocol Iot Devices | 0 | 0.34 | 2017 |
TDMA-based efficient cooperative relaying selection scheme in multi-hop wireless networks. | 1 | 0.37 | 2017 |
Detrended fluctuation analysis on ECG device for home environment | 1 | 0.36 | 2017 |
Towards scalable security analysis using multi-layered security models. | 13 | 0.64 | 2016 |