With the advent of the big data era, the threat of network security is becoming increasingly severe. In order to cope with complex network attacks and ensure network security, a network intrusion detection model is constructed relying on deep learnin...
In the realm of Wireless Sensor Networks (WSNs), the detection and mitigation of sinkhole attacks remain pivotal for ensuring network integrity and efficiency. This paper introduces SFlexCrypt, an innovative approach tailored to address these securit...
Vehicular Networks (VN) utilizing Software Defined Networking (SDN) have garnered significant attention recently, paralleling the advancements in wireless networks. VN are deployed to optimize traffic flow, enhance the driving experience, and ensure ...
IEEE journal of biomedical and health informatics
Nov 6, 2024
The burgeoning domain of the metaverse has sparked significant interest from a diverse array of industries, including healthcare services. However, the metaverse and its associated applications present various challenges to existing networks. First, ...
Given the resource limitations of wireless sensor networks (WSNs), energy conservation is of utmost importance. Moreover, minimizing data collection delays is crucial to maintaining data freshness. Additionally, it is desirable to increase the number...
International journal of computer assisted radiology and surgery
Sep 9, 2024
PURPOSE: Healthcare systems around the world are increasingly facing severe challenges due to problems such as staff shortage, changing demographics and the reliance on an often strongly human-dependent environment. One approach aiming to address the...
The Internet of Things (IoT) is an extensive system of interrelated devices equipped with sensors to monitor and track real world objects, spanning several verticals, covering many different industries. The IoT's promise is capturing interest as its ...
Computer networks face vulnerability to numerous attacks, which pose significant threats to our data security and the freedom of communication. This paper introduces a novel intrusion detection technique that diverges from traditional methods by leve...
With the escalation in the size and complexity of modern Denial of Service attacks, there is a need for research in the context of Machine Learning (ML) used in attack execution and defense against such attacks. This paper investigates the potential ...
In wireless sensor networks, the implementation of clustering and routing protocols has been crucial in prolonging the network's operational duration by conserving energy. However, the challenge persists in efficiently optimizing energy usage to maxi...
Join thousands of healthcare professionals staying informed about the latest AI breakthroughs in medicine. Get curated insights delivered to your inbox.