4.6 Article

Scheduling algorithms for data- protection based on security-classification constraints to data-dissemination

Related references

Note: Only part of the references are listed.
Article Multidisciplinary Sciences

Novel intelligent architecture and approximate solution for future networks

Akram Sarhan et al.

Summary: Private networks are popular for secure data sharing and anonymous communication in various domains. This research presents a smart private network architecture that transmits constraint-based classified packets, addressing the NP-hard problem of simultaneous transmission of packets with the same confidentiality level through two routers. New architecture paradigm and algorithms are proposed, with the randomized Longest Transmission time first algorithm RLT over bar performing the best with a 73.5% success rate and an average gap of 0.002.

PLOS ONE (2023)

Article Computer Science, Artificial Intelligence

A novel smart multilevel security approach for secure data outsourcing in crisis

Akram Y. Sarhan

Summary: The Internet has revolutionized digital communications, expanding worldwide over the past four decades due to its features such as connectivity, transparency, hierarchy, and openness. However, there are drawbacks including mobility, scalability, controllability, and security. This research proposed a future network paradigm to address multilevel security shortcomings, suggesting a two-router network-based architecture, a scheduler for multilevel transmitted packets, and five algorithms for the studied difficult problem. The experimental result showed the random-grouped classification with shortest scheduling algorithm (RGS) performed the best at 37.7% with a gap of 0.03, proving the practicality of the approach.

PEERJ COMPUTER SCIENCE (2023)

Article Computer Science, Information Systems

A Novel Two-Routers Model Based on Category Constraints Secure Data-Dissemination-Aware Scheduling in Next-Generation Communication Networks

Mahdi Jemmali et al.

Summary: Data breaches are a significant risk in today's data-driven digital environment, making secure data outsourcing essential. This paper proposes a network model for secure transmission of confidential data, utilizing a private novel network architecture and heuristics to reduce the problem complexity. Experimental results show the effectiveness of the proposed solution, with an 84.4% success rate for the best heuristic.

JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT (2023)

Article Automation & Control Systems

A Novel Model Based on Window-Pass Preferences for Data Emergency Aware Scheduling in Computer Networks

Mahdi Jemmali et al.

Summary: The breakdown of vital communication infrastructures can cause severe communication problems, but the advancement of artificial intelligence technologies can help mitigate these issues. This study introduces a network scheduler and router window constraints to tackle problems related to high priority and emergency data allocation.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

A source location privacy preservation scheme in WSN-assisted IoT network by randomized ring and confounding transmission

Anurag Shukla et al.

Summary: This study proposes a method to protect the privacy of sensor node location in wireless sensor networks by using randomized routing and confusing transmission. The results of simulation experiments and theoretical analysis show that this method performs better in terms of safety time, randomization in transmission delay, and network lifetime.

WIRELESS NETWORKS (2022)

Article Computer Science, Artificial Intelligence

A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles

Hua Yi Lin et al.

Summary: This research focuses on protecting secure information transmission in the Internet of vehicles and proposes a multilevel security infrastructure using the M-tree based elliptic curve digital signature algorithm (ECDSA). It also provides flexible schemes to adapt to the rapidly changing topology of the Internet of vehicles and integrates key management with secure data transmission for a secure IoV.

CONNECTION SCIENCE (2022)

Article Automation & Control Systems

Near-Optimal Solutions for Mold Constraints on Two Parallel Machines

Abir Ben Hmida et al.

Summary: This paper investigates the mold constraints for the two parallel machines problem and proposes different heuristics and a novel meta-heuristics algorithm to solve the problem, with computational results demonstrating near-optimal solutions for the majority of instances.

STUDIES IN INFORMATICS AND CONTROL (2022)

Article Engineering, Industrial

TWO-STAGE HYBRID FLOWSHOP SCHEDULING PROBLEM WITH INDEPENDENT SETUP TIMES

M. Jemmali et al.

Summary: This paper examines a two-stage hybrid flowshop scheduling problem with independent setup times and proposes a genetic algorithm and other heuristics to solve it. Through a numerical study, it confirms the efficiency and performance of the proposed methods.

INTERNATIONAL JOURNAL OF SIMULATION MODELLING (2022)

Article Computer Science, Artificial Intelligence

An efficient multilevel security architecture for blockchain-based IoT networks using principles of cellular automata

Fasila Ali et al.

Summary: The widespread use of IoT has greatly impacted daily life worldwide, demanding stronger security measures to protect sensitive data. This paper introduces a novel security architecture for IoT-based distributed applications, which proves to be efficient in terms of data protection and security.

PEERJ COMPUTER SCIENCE (2022)

Article Computer Science, Information Systems

Enforcing Multilevel Security Policies in Unstable Networks

Quinn Burke et al.

Summary: Multilevel security systems control data access and prevent unauthorized disclosure, providing efficient network labeling services in dynamic environments.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2022)

Article Engineering, Civil

An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant

Mahdi Jemmali et al.

Summary: This research proposes a novel approach to optimize the flying time of battery-based drone systems in order to enhance the performance of solar energy plants. The approach solves scheduling problems based on timing constraints to improve the availability and reliability of the solar plant monitoring system.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Computer Science, Information Systems

MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking

Stefan Achleitner et al.

Summary: This article proposes a novel multilevel security framework to enforce a secure inter-node information flow policy within the network, vastly reducing the attack surface available to adversaries. Unlike traditional approaches, the framework leverages the centralization of software-defined networks to provide transparent security service to all network nodes. Experimental results demonstrate that the framework can securely and efficiently route flows that satisfy security constraints.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Article Operations Research & Management Science

An optimal solution for the budgets assignment problem

Mahdi Jemmali

Summary: Municipalities play a crucial role in community development and strategic planning, facing complex challenges in budget allocation and project distribution. This paper proposes a method to address the equitable distribution of project budgets between municipalities and demonstrates its performance through experimental studies.

RAIRO-OPERATIONS RESEARCH (2021)

Article Telecommunications

Fixed Urgent Window Pass for a Wireless Network with User Preferences

Hani Alquhayz et al.

Summary: This research focuses on the router allocation problem with sensitive, highest-priority, and severe demand constraints, introducing a scheduler for intelligencers to forward their packets with the highest priority. Eight heuristics based on dispatching, iterative randomization, and subset-sum methods are proposed to solve the scheduling problem. The algorithms prioritize packets based on constraints, rearrange non-scheduled packets, and showed promising performance in terms of gap and time.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Article Computer Science, Artificial Intelligence

Projects Distribution Algorithms for Regional Development

Mandi Jemmali

Summary: This paper aims to find an efficient method to allocate different projects to various regions for an equitable distribution of expected revenues. Mathematical formulations and multiple algorithms are proposed to ensure fair distribution of total revenues between regions and load balancing of total expected revenues in each region.

ADCAIJ-ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL (2021)

Article Computer Science, Information Systems

Present and Future of Network Security Monitoring

Marta Fuentes-Garcia et al.

Summary: Network Security Monitoring (NSM) is crucial for detecting security incidents by monitoring network events, especially in the face of increasing cyberwarfare sophistication. This paper provides a new taxonomy for assessing NSM deployments and tools, and highlights challenges in applying NSM to modern network deployments such as SDN and IoT.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Towards Designing a Trusted Routing Scheme in Wireless Sensor Networks: A New Deep Blockchain Approach

Ibrahim A. Abd El-Moghith And et al.

Summary: Routing is a critical process in Wireless Sensor Networks (WSNs) to ensure data transmission to base stations. Existing routing methods are often impractical in practice and difficult to identify untrusted activities of routing nodes effectively. This article proposes a trusted routing method that combines deep blockchain and Markov Decision Processes (MDPs) to enhance the routing security and efficiency of WSNs.

IEEE ACCESS (2021)

Article Operations Research & Management Science

Near-optimal solutions and tight lower bounds for the parallel machines scheduling problem with learning effect

Lotfi Hidri et al.

RAIRO-OPERATIONS RESEARCH (2020)

Article Mathematics, Interdisciplinary Applications

Dispatching-Rule Variants Algorithms for Used Spaces of Storage Supports

Hani Alquhayz et al.

DISCRETE DYNAMICS IN NATURE AND SOCIETY (2020)

Article Mathematical & Computational Biology

Algorithms for Investment Project Distribution on Regions

Mafawez Alharbi et al.

COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE (2020)

Article Computer Science, Information Systems

Network traffic reduction and representation

Loai Kayed B. Melhim et al.

INTERNATIONAL JOURNAL OF SENSOR NETWORKS (2020)

Article Computer Science, Information Systems

Survey of Attack Projection, Prediction, and Forecasting in Cyber Security

Martin Husak et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks

Jiawei Tang et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Computer Science, Information Systems

A Blockchain-Based Contractual Routing Protocol for the Internet of Things Using Smart Contracts

Gholamreza Ramezan et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)

Review Computer Science, Information Systems

Cyber security meets artificial intelligence: a survey

Jian-hua Li

FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING (2018)

Article Computer Science, Information Systems

Big Data Perspective and Challenges in Next Generation Networks

Kashif Sultan et al.

FUTURE INTERNET (2018)

Article Computer Science, Information Systems

Trust-based backpressure routing in wireless sensor networks

Revathi Venkataraman et al.

INTERNATIONAL JOURNAL OF SENSOR NETWORKS (2015)