Related references
Note: Only part of the references are listed.
Article
Multidisciplinary Sciences
Akram Sarhan et al.
Summary: Private networks are popular for secure data sharing and anonymous communication in various domains. This research presents a smart private network architecture that transmits constraint-based classified packets, addressing the NP-hard problem of simultaneous transmission of packets with the same confidentiality level through two routers. New architecture paradigm and algorithms are proposed, with the randomized Longest Transmission time first algorithm RLT over bar performing the best with a 73.5% success rate and an average gap of 0.002.
Article
Computer Science, Artificial Intelligence
Akram Y. Sarhan
Summary: The Internet has revolutionized digital communications, expanding worldwide over the past four decades due to its features such as connectivity, transparency, hierarchy, and openness. However, there are drawbacks including mobility, scalability, controllability, and security. This research proposed a future network paradigm to address multilevel security shortcomings, suggesting a two-router network-based architecture, a scheduler for multilevel transmitted packets, and five algorithms for the studied difficult problem. The experimental result showed the random-grouped classification with shortest scheduling algorithm (RGS) performed the best at 37.7% with a gap of 0.03, proving the practicality of the approach.
PEERJ COMPUTER SCIENCE
(2023)
Article
Computer Science, Information Systems
Mahdi Jemmali et al.
Summary: Data breaches are a significant risk in today's data-driven digital environment, making secure data outsourcing essential. This paper proposes a network model for secure transmission of confidential data, utilizing a private novel network architecture and heuristics to reduce the problem complexity. Experimental results show the effectiveness of the proposed solution, with an 84.4% success rate for the best heuristic.
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT
(2023)
Article
Automation & Control Systems
Mahdi Jemmali et al.
Summary: The breakdown of vital communication infrastructures can cause severe communication problems, but the advancement of artificial intelligence technologies can help mitigate these issues. This study introduces a network scheduler and router window constraints to tackle problems related to high priority and emergency data allocation.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Computer Science, Information Systems
Anurag Shukla et al.
Summary: This study proposes a method to protect the privacy of sensor node location in wireless sensor networks by using randomized routing and confusing transmission. The results of simulation experiments and theoretical analysis show that this method performs better in terms of safety time, randomization in transmission delay, and network lifetime.
Article
Computer Science, Artificial Intelligence
Hua Yi Lin et al.
Summary: This research focuses on protecting secure information transmission in the Internet of vehicles and proposes a multilevel security infrastructure using the M-tree based elliptic curve digital signature algorithm (ECDSA). It also provides flexible schemes to adapt to the rapidly changing topology of the Internet of vehicles and integrates key management with secure data transmission for a secure IoV.
CONNECTION SCIENCE
(2022)
Article
Automation & Control Systems
Abir Ben Hmida et al.
Summary: This paper investigates the mold constraints for the two parallel machines problem and proposes different heuristics and a novel meta-heuristics algorithm to solve the problem, with computational results demonstrating near-optimal solutions for the majority of instances.
STUDIES IN INFORMATICS AND CONTROL
(2022)
Article
Engineering, Industrial
M. Jemmali et al.
Summary: This paper examines a two-stage hybrid flowshop scheduling problem with independent setup times and proposes a genetic algorithm and other heuristics to solve it. Through a numerical study, it confirms the efficiency and performance of the proposed methods.
INTERNATIONAL JOURNAL OF SIMULATION MODELLING
(2022)
Article
Computer Science, Artificial Intelligence
Fasila Ali et al.
Summary: The widespread use of IoT has greatly impacted daily life worldwide, demanding stronger security measures to protect sensitive data. This paper introduces a novel security architecture for IoT-based distributed applications, which proves to be efficient in terms of data protection and security.
PEERJ COMPUTER SCIENCE
(2022)
Article
Computer Science, Information Systems
Quinn Burke et al.
Summary: Multilevel security systems control data access and prevent unauthorized disclosure, providing efficient network labeling services in dynamic environments.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
(2022)
Article
Engineering, Civil
Mahdi Jemmali et al.
Summary: This research proposes a novel approach to optimize the flying time of battery-based drone systems in order to enhance the performance of solar energy plants. The approach solves scheduling problems based on timing constraints to improve the availability and reliability of the solar plant monitoring system.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2022)
Article
Computer Science, Information Systems
Stefan Achleitner et al.
Summary: This article proposes a novel multilevel security framework to enforce a secure inter-node information flow policy within the network, vastly reducing the attack surface available to adversaries. Unlike traditional approaches, the framework leverages the centralization of software-defined networks to provide transparent security service to all network nodes. Experimental results demonstrate that the framework can securely and efficiently route flows that satisfy security constraints.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
(2021)
Article
Operations Research & Management Science
Mahdi Jemmali
Summary: Municipalities play a crucial role in community development and strategic planning, facing complex challenges in budget allocation and project distribution. This paper proposes a method to address the equitable distribution of project budgets between municipalities and demonstrates its performance through experimental studies.
RAIRO-OPERATIONS RESEARCH
(2021)
Article
Telecommunications
Hani Alquhayz et al.
Summary: This research focuses on the router allocation problem with sensitive, highest-priority, and severe demand constraints, introducing a scheduler for intelligencers to forward their packets with the highest priority. Eight heuristics based on dispatching, iterative randomization, and subset-sum methods are proposed to solve the scheduling problem. The algorithms prioritize packets based on constraints, rearrange non-scheduled packets, and showed promising performance in terms of gap and time.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Computer Science, Artificial Intelligence
Mandi Jemmali
Summary: This paper aims to find an efficient method to allocate different projects to various regions for an equitable distribution of expected revenues. Mathematical formulations and multiple algorithms are proposed to ensure fair distribution of total revenues between regions and load balancing of total expected revenues in each region.
ADCAIJ-ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL
(2021)
Article
Computer Science, Information Systems
Marta Fuentes-Garcia et al.
Summary: Network Security Monitoring (NSM) is crucial for detecting security incidents by monitoring network events, especially in the face of increasing cyberwarfare sophistication. This paper provides a new taxonomy for assessing NSM deployments and tools, and highlights challenges in applying NSM to modern network deployments such as SDN and IoT.
Article
Computer Science, Information Systems
Ibrahim A. Abd El-Moghith And et al.
Summary: Routing is a critical process in Wireless Sensor Networks (WSNs) to ensure data transmission to base stations. Existing routing methods are often impractical in practice and difficult to identify untrusted activities of routing nodes effectively. This article proposes a trusted routing method that combines deep blockchain and Markov Decision Processes (MDPs) to enhance the routing security and efficiency of WSNs.
Article
Operations Research & Management Science
Lotfi Hidri et al.
RAIRO-OPERATIONS RESEARCH
(2020)
Article
Mathematics, Interdisciplinary Applications
Hani Alquhayz et al.
DISCRETE DYNAMICS IN NATURE AND SOCIETY
(2020)
Article
Mathematical & Computational Biology
Mafawez Alharbi et al.
COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE
(2020)
Article
Computer Science, Information Systems
Loai Kayed B. Melhim et al.
INTERNATIONAL JOURNAL OF SENSOR NETWORKS
(2020)
Article
Computer Science, Information Systems
Martin Husak et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2019)
Article
Computer Science, Information Systems
Jiawei Tang et al.
SECURITY AND COMMUNICATION NETWORKS
(2018)
Article
Computer Science, Information Systems
Gholamreza Ramezan et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING
(2018)
Review
Computer Science, Information Systems
Jian-hua Li
FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING
(2018)
Article
Computer Science, Information Systems
Kashif Sultan et al.
Article
Computer Science, Information Systems
Revathi Venkataraman et al.
INTERNATIONAL JOURNAL OF SENSOR NETWORKS
(2015)