4.3 Article

Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

A QoE-Driven Multicast Strategy With Segment Routing-A Novel Multimedia Traffic Engineering Paradigm

Shujie Yang et al.

IEEE TRANSACTIONS ON BROADCASTING (2020)

Article Computer Science, Information Systems

A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPU

Sweta Bhattacharya et al.

ELECTRONICS (2020)

Article Computer Science, Hardware & Architecture

Decentralized asynchronous optimization for dynamic adaptive multimedia streaming over information centric networking

Mu Wang et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Information Systems

Analysis of Dimensionality Reduction Techniques on Big Data

G. Thippa Reddy et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system

Rajat Chaudhary et al.

COMPUTERS & SECURITY (2019)

Review Computer Science, Hardware & Architecture

A survey on privacy protection in blockchain system

Qi Feng et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Theory & Methods

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment

Prosanta Gope et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

SeDaTiVe: SDN-Enabled Deep Learning Architecture for Network Traffic Control in Vehicular Cyber-Physical Systems

Anish Jindal et al.

IEEE NETWORK (2018)

Article Telecommunications

Energy-efficient modified LEACH protocol for IoT application

Trupti Mayee Behera et al.

IET WIRELESS SENSOR SYSTEMS (2018)

Article Computer Science, Artificial Intelligence

Two-tier network anomaly detection model: a machine learning approach

Hamed Haddad Pajouh et al.

JOURNAL OF INTELLIGENT INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

Privacy-preserving data aggregation scheme against internal attackers in smart grids

Debiao He et al.

WIRELESS NETWORKS (2016)

Article Engineering, Electrical & Electronic

Joint Optimal Placement, Routing, and Flow Assignment in Wireless Sensor Networks for Structural Health Monitoring

Mohamed Elsersy et al.

IEEE SENSORS JOURNAL (2016)

Proceedings Paper Computer Science, Artificial Intelligence

Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature Selection

Navaneeth Kumar Kanakarajan et al.

PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015 (2016)

Proceedings Paper Computer Science, Artificial Intelligence

DAREnsemble: Decision Tree and Rule Learner Based Ensemble for Network Intrusion Detection System

Dwarkoba Gaikwad et al.

PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 1 (2016)

Article Telecommunications

Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours

Elena Pagnin et al.

IEEE COMMUNICATIONS LETTERS (2015)

Article Engineering, Electrical & Electronic

Geographic Routing in Clustered Wireless Sensor Networks Among Obstacles

Hari Prabhat Gupta et al.

IEEE SENSORS JOURNAL (2015)

Article Computer Science, Hardware & Architecture

An intelligent approach for building a secure decentralized public key infrastructure in VANET

Neeraj Kumar et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2015)

Article Automation & Control Systems

R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Networks

Jianwei Niu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)

Article Computer Science, Hardware & Architecture

Accurate and Efficient Node Localization for Mobile Sensor Networks

Hongyang Chen et al.

MOBILE NETWORKS & APPLICATIONS (2013)

Proceedings Paper Computer Science, Hardware & Architecture

Route Discovery Protocol for Optimizing the Power Consumption in Wireless Ad-hoc Network

Amit Chaturvedi et al.

2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013) (2013)

Article Computer Science, Information Systems

Exploiting Virtual Coordinates for Improved Routing Performance in Sensor Networks

Abdalkarim Awad et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2011)

Article Engineering, Electrical & Electronic

Communication Cost Minimization in Wireless Sensor and Actor Networks for Road Surveillance

Wenzhong Li et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2011)

Article Engineering, Electrical & Electronic

Mobile Element Assisted Cooperative Localization for Wireless Sensor Networks with Obstacles

Hongyang Chen et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2010)

Article Computer Science, Information Systems

SGF: A State-Free Gradient-Based Forwarding Protocol for Wireless Sensor Networks

Pei Huang et al.

ACM TRANSACTIONS ON SENSOR NETWORKS (2009)

Article Computer Science, Hardware & Architecture

Energy Efficient and Scalable Search in Dense Wireless Sensor Networks

Kiran K. Rachuri et al.

IEEE TRANSACTIONS ON COMPUTERS (2009)

Review Computer Science, Hardware & Architecture

Wireless sensor network survey

Jennifer Yick et al.

COMPUTER NETWORKS (2008)

Article Engineering, Electrical & Electronic

An application-specific protocol architecture for wireless microsensor networks

WB Heinzelman et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2002)

Article Computer Science, Hardware & Architecture

Wireless sensor networks: a survey

IF Akyildiz et al.

COMPUTER NETWORKS (2002)