Filters








1,213 Hits in 7.2 sec

A Review of the cluster based Mobile Adhoc Network Intrusion Detection System

T. Sushma, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
The cluster is unpredictable and results in processing maximization together with network traffic. In general, battery-based ad hoc networks are organized and dependent on power constraints.  ...  This framework is made up of clustering protocols that are extremely efficient in finding intrusions with low resource and overhead computing costs.  ...  Literature Survey on Cluster Based Ids In recent years, Mobile Ad-hoc Network security has become a highlighted issue among the research community via massive growth.  ... 
doi:10.17762/turcomat.v12i2.1811 fatcat:ad7jyasstrh7zbxxq6zfn7zwt4

5G New Radio: Dynamic Time Division Duplex Radio Resource Management Approaches

F. S. Samidi, N. A. M. Radzi, W. S. H. M. W. Ahmad, F. Abdullah, M. Z. Jamaludin, A. Ismail
2021 IEEE Access  
This traffic-aware system will determine the most appropriate configuration in the entire hybrid network, based on the traffic dynamics.  ...  Based on the work in Seng et al. [87] , the problems of Hierarchical TDD interference in UDNs is solved by implementing a clustering approach based on the Chameleon algorithms.  ... 
doi:10.1109/access.2021.3104277 fatcat:s6xyfoefwnanzd7be642wleul4

2020 Index IEEE Transactions on Vehicular Technology Vol. 69

2020 IEEE Transactions on Vehicular Technology  
Revocable Data-Sharing Scheme in VANETs; TVT Dec. 2020 15933-15946 Hoseini, S.A., Ding, M., Hassan, M., and Chen, Y., Analyzing the Impact of Molecular Re-Radiation on the MIMO Capacity in High-Frequency  ...  ., TVT Dec. 2020 16168-16172 Hong, C., Shan, H., Song, M., Zhuang, W., Xiang, Z., Wu, Y., and Yu, X., A Joint Design of Platoon Communication and Control Based on LTE-V2V; 15893-15907 Hong, C.S., see  ...  Liu, W., +, Subchannel Allocation Based on Clustered Interference Alignment for Differentiated Data Streams in Dense Small Cell Networks.  ... 
doi:10.1109/tvt.2021.3055470 fatcat:536l4pgnufhixneoa3a3dibdma

False alarm minimization techniques in signature-based intrusion detection systems: A survey

Neminath Hubballi, Vinoth Suryanarayanan
2014 Computer Communications  
In this paper, we review existing false alarm minimization techniques in signature-based Network Intrusion Detection System (NIDS).  ...  A network based Intrusion Detection System (IDS) gathers and analyzes network packets and report possible low level security violations to a system administrator.  ...  External Intruders attempt to gain unauthorized access to system resources from outside the target network. One of the earliest work on intrusion detection in computer networks is presented by James.  ... 
doi:10.1016/j.comcom.2014.04.012 fatcat:j4amw76kuncybhxuaosuq4sbre

Swarm Intelligence for Next-Generation Wireless Networks: Recent Advances and Applications [article]

Quoc-Viet Pham, Dinh C. Nguyen, Seyedali Mirjalili, Dinh Thai Hoang, Diep N. Nguyen, Pubudu N. Pathirana, Won-Joo Hwang
2020 arXiv   pre-print
In such a network, a very large number of devices and applications are emerged, along with heterogeneity of technologies, architectures, mobile data, etc., and optimizing such a network is of utmost importance  ...  Secondly, we review the applications of SI to settle emerging issues in NGN, including spectrum management and resource allocation, wireless caching and edge computing, network security, and several other  ...  ., data mining [24] , intrusion detection [30] , dynamic optimization [31] , electric power system [32] , graphical processing unit (GPU)-based implementation [33] , and portfolio optimization [34  ... 
arXiv:2007.15221v1 fatcat:ysap6mdfcvdbtcwojnmvvbrjdu

Table of contents

2020 IEEE Systems Journal  
Efficient Ranked Multi-Keyword Retrieval With Privacy Protection for Multiple Data Owners in Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Huang 1874 Detection of False Data Injection Attacks in Smart Grids Based on Graph Signal Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/jsyst.2020.2989249 fatcat:2wad2okg2ncmbl77zihgh5gmqa

2014 Index IEEE Transactions on Parallel and Distributed Systems Vol. 25

2015 IEEE Transactions on Parallel and Distributed Systems  
., +, TPDS Sept. 2014 2442-2451 Wireless Spectrum Occupancy Prediction Based on Partial Periodic Pattern Mining.  ...  Xie, Ruitao, +, TPDS March 2014 806-815 Data flow computing Hybrid Dataflow/von-Neumann Architectures.  ...  on Homogeneous Multiprocessors. 1510 -1521 In-Network Cache Management and Resource Allocation for Information-Centric Networks.  ... 
doi:10.1109/tpds.2014.2371591 fatcat:qxyljogalrbfficryqjowgv3je

Machine Learning Paradigms for Next-Generation Wireless Networks

Chunxiao Jiang, Haijun Zhang, Yong Ren, Zhu Han, Kwang-Cheng Chen, Lajos Hanzo
2017 IEEE wireless communications  
Hence we briefly review the rudimentary concepts of machine learning and propose their employment in the compelling applications of 5G networks, including cognitive radios, massive MIMOs, femto/small cells  ...  Next-generation wireless networks are expected to support extremely high data rates and radically new applications, which require a new wireless radio technology paradigm.  ...  Due to the energy constraints and computational complexity constraints of mobil terminals, it is recommended to only implement the testing phase on shirt-pocket-sized mobile terminals.  ... 
doi:10.1109/mwc.2016.1500356wc fatcat:qyg65wlf5verhefwnzfdzmhopu

Machine Learning Approach to Combat False Alarms in Wireless Intrusion Detection System

D. Sudaroli Vijayakumar, S. Ganapathy
2018 Computer and Information Science  
Security concerns in WLAN are studied and many organizations concluded that Wireless Intrusion Detection Systems (WIDS) is an essential element in network security infrastructure to monitor wireless activity  ...  WIDS generally collect the activities within the protected network and analyze them to detect intrusions and generates an intrusion alarm.  ...  One very important work with respect to data mining is to find alarm clusters and generalised forms of false alarms to analyse the root causes [21] .  ... 
doi:10.5539/cis.v11n3p67 fatcat:zgz2dvildjdmxlwue3fccd2tsq

Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation

Basant Subba, Santosh Biswas, Sushanta Karmakar
2016 Engineering Science and Technology, an International Journal  
The hybrid IDS comprises a threshold based lightweight module and a powerful anomaly based heavyweight module. Initially, only the lightweight module is activated.  ...  To address this issue, we propose a new IDS scheme comprising a novel cluster leader election process and a hybrid IDS.  ...  Lightweight intrusion detection system (LIDS) It is not efficient to operate the association-rule based HIDS in an always-on mode since it uses massive packet-level transmissions of network and MAC layers  ... 
doi:10.1016/j.jestch.2015.11.001 fatcat:chbc2ks5rvgmbpjwjbt3ekucg4

Big Data Meet Cyber-Physical Systems: A Panoramic Survey

Rachad Atat, Lingjia Liu, Jinsong Wu, Guangyu Li, Chunxuan Ye, Yi Yang
2018 IEEE Access  
in the network.  ...  We also discuss big data meeting green challenges in the contexts of CPS.  ...  In [183] , Clemente-Castellèt'ß et al.suggested using a hybrid cloud computing consisting of public and private clouds to accelerate the analysis of massive data workloads on MapReduce framework without  ... 
doi:10.1109/access.2018.2878681 fatcat:czfu37subng6bl3sgd3a243vn4

A survey on Machine Learning-based Performance Improvement of Wireless Networks: PHY, MAC and Network layer [article]

Merima Kulin, Tarik Kazaz, Ingrid Moerman, Eli de Poorter
2020 arXiv   pre-print
This paper provides a systematic and comprehensive survey that reviews the latest research efforts focused on machine learning (ML) based performance improvement of wireless networks, while considering  ...  Then, a comprehensive review is presented on works employing ML-based approaches to optimize the wireless communication parameters settings to achieve improved network quality-of-service (QoS) and quality-of-experience  ...  Clustering Example 2: Data aggregation in WSN In [64] a data aggregation scheme is proposed for in-network data summarization to save energy and reduce computation in wireless sensor nodes.  ... 
arXiv:2001.04561v2 fatcat:kbbvgechmjgwla6noolrf6ds7u

Big Data Meet Cyber-Physical Systems: A Panoramic Survey [article]

Rachad Atat, Lingjia Liu, Jinsong Wu, Guangyu Li, Chunxuan Ye, Yang Yi
2018 arXiv   pre-print
in the network.  ...  Furthermore, CPS require cybersecurity to protect them against malicious attacks and unauthorized intrusion, which become a challenge with the enormous amount of data that is continuously being generated  ...  In [183] , the authors suggested using a hybrid cloud computing consisting of public and private clouds to accelerate the analysis of massive data workloads on MapReduce framework without requiring significant  ... 
arXiv:1810.12399v1 fatcat:2diydpforraofhyhhkfs3fnjtu

Wireless AI: Enabling an AI-Governed Data Life Cycle [article]

Dinh C. Nguyen, Peng Cheng, Ming Ding, David Lopez-Perez, Pubudu N. Pathirana, Jun Li, Aruna Seneviratne, Yonghui Li, H. Vincent Poor
2020 arXiv   pre-print
Big data analysis, pervasive computing , and eventually artificial intelligence (AI) are envisaged to be deployed on top of IoT and create a new world featured by data-driven AI.  ...  Particularly, compared to the other related survey papers, we provide an in-depth discussion on the Wireless AI applications in various data-driven domains wherein AI proves extremely useful for wireless  ...  To support hybrid precoding in mmWave MIMO-OFDM systems, a ML approach using cluster analysis is introduced in [135] .  ... 
arXiv:2003.00866v1 fatcat:dofctwtag5ewhhzaseeukhtxbe

IEEE Access Special Section Editorial: Communications in Harsh Environments

Qilian Liang, Tariq S. Durrani, Xin Wang, Wei Wang, Jinhwan Koh, Qiong Wu
2021 IEEE Access  
Then, the authors propose a temporal-frequency attention network model based on the attention mechanism to perform feature learning and activity recognition on data and use the attention mechanism to overcome  ...  In the article ''Constant reflection attenuation constraint for incoming signals on metasurface in positional modulation design,'' by Liang et al., a constant reflection attenuation constraint for incoming  ... 
doi:10.1109/access.2021.3077176 fatcat:nnggukisyrdill733z7twkfk5e
« Previous Showing results 1 — 15 out of 1,213 results