AIMC Topic: Computer Communication Networks

Clear Filters Showing 1 to 10 of 94 articles

Construction of VAE-GRU-XGBoost intrusion detection model for network security.

PloS one
With the advent of the big data era, the threat of network security is becoming increasingly severe. In order to cope with complex network attacks and ensure network security, a network intrusion detection model is constructed relying on deep learnin...

An efficient detection of Sinkhole attacks using machine learning: Impact on energy and security.

PloS one
In the realm of Wireless Sensor Networks (WSNs), the detection and mitigation of sinkhole attacks remain pivotal for ensuring network integrity and efficiency. This paper introduces SFlexCrypt, an innovative approach tailored to address these securit...

Effective DDoS attack detection in software-defined vehicular networks using statistical flow analysis and machine learning.

PloS one
Vehicular Networks (VN) utilizing Software Defined Networking (SDN) have garnered significant attention recently, paralleling the advancements in wireless networks. VN are deployed to optimize traffic flow, enhance the driving experience, and ensure ...

Integrating Smart Computility for Subflow Orchestration in Remote Virtual Services.

IEEE journal of biomedical and health informatics
The burgeoning domain of the metaverse has sparked significant interest from a diverse array of industries, including healthcare services. However, the metaverse and its associated applications present various challenges to existing networks. First, ...

An energy-aware protocol in wireless sensor networks using the scattered search algorithm and fuzzy logic.

PloS one
Given the resource limitations of wireless sensor networks (WSNs), energy conservation is of utmost importance. Moreover, minimizing data collection delays is crucial to maintaining data freshness. Additionally, it is desirable to increase the number...

6G in medical robotics: development of network allocation strategies for a telerobotic examination system.

International journal of computer assisted radiology and surgery
PURPOSE: Healthcare systems around the world are increasingly facing severe challenges due to problems such as staff shortage, changing demographics and the reliance on an often strongly human-dependent environment. One approach aiming to address the...

FSRW: fuzzy logic-based whale optimization algorithm for trust-aware routing in IoT-based healthcare.

Scientific reports
The Internet of Things (IoT) is an extensive system of interrelated devices equipped with sensors to monitor and track real world objects, spanning several verticals, covering many different industries. The IoT's promise is capturing interest as its ...

Advancements in intrusion detection: A lightweight hybrid RNN-RF model.

PloS one
Computer networks face vulnerability to numerous attacks, which pose significant threats to our data security and the freedom of communication. This paper introduces a novel intrusion detection technique that diverges from traditional methods by leve...

Detecting DoS Attacks through Synthetic User Behavior with Long Short-Term Memory Network.

Sensors (Basel, Switzerland)
With the escalation in the size and complexity of modern Denial of Service attacks, there is a need for research in the context of Machine Learning (ML) used in attack execution and defense against such attacks. This paper investigates the potential ...

Efficient cluster-based routing protocol for wireless sensor networks by using collaborative-inspired Harris Hawk optimization and fuzzy logic.

PloS one
In wireless sensor networks, the implementation of clustering and routing protocols has been crucial in prolonging the network's operational duration by conserving energy. However, the challenge persists in efficiently optimizing energy usage to maxi...