Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (168)
- Air Force Institute of Technology (160)
- Old Dominion University (141)
- California State University, San Bernardino (137)
- California Polytechnic State University, San Luis Obispo (126)
-
- Singapore Management University (112)
- University of Nebraska - Lincoln (69)
- Technological University Dublin (60)
- University of Pennsylvania Carey Law School (54)
- New Jersey Institute of Technology (53)
- University for Business and Technology in Kosovo (51)
- Purdue University (43)
- University of Arkansas, Fayetteville (43)
- University of Kentucky (42)
- SelectedWorks (38)
- Edith Cowan University (35)
- Embry-Riddle Aeronautical University (35)
- Portland State University (32)
- University of Massachusetts Amherst (29)
- Western University (29)
- University of New Mexico (28)
- Institute of Business Administration (26)
- Association of Arab Universities (24)
- The University of Akron (24)
- University of Nevada, Las Vegas (24)
- Florida International University (23)
- Kennesaw State University (23)
- University of Tennessee, Knoxville (17)
- Cleveland State University (15)
- University of Georgia School of Law (15)
- Keyword
-
- Security (52)
- Internet (42)
- Computer networks (41)
- Cybersecurity (36)
- Internet of Things (33)
-
- Machine learning (33)
- Computerized Conferencing & Communications Center (31)
- IoT (31)
- Blockchain (27)
- Privacy (27)
- #antcenter (25)
- Wireless communication systems (24)
- Networking (23)
- Wireless sensor networks (23)
- Routing (22)
- Deep Learning (19)
- Digital libraries (19)
- Machine Learning (18)
- Technology (18)
- Android (17)
- Communication (17)
- Computer networks--Security measures (17)
- Wireless (16)
- Cloud computing (15)
- Deep learning (15)
- Social media (15)
- Authentication (14)
- Wireless Networks (14)
- Algorithms (13)
- Automation (13)
- Publication Year
- Publication
-
- Theses and Dissertations (165)
- Journal of International Technology and Information Management (115)
- Research Collection School Of Computing and Information Systems (97)
- Computer Engineering (56)
- All Faculty Scholarship (54)
-
- Faculty Publications (51)
- Computer Science Faculty Publications (41)
- UBT International Conference (38)
- Theses (36)
- Computerized Conferencing and Communications Center Reports (33)
- Computer Science Theses & Dissertations (32)
- Master's Theses (31)
- Electronic Thesis and Dissertation Repository (26)
- Patrick Tague (26)
- Conference papers (25)
- International Conference on Information and Communication Technologies (24)
- Williams Honors College, Honors Research Projects (24)
- FIU Electronic Theses and Dissertations (22)
- Library Philosophy and Practice (e-journal) (22)
- Electrical and Computer Engineering Faculty Publications (21)
- Hong-Ning Dai (21)
- Doctoral Dissertations (20)
- Graduate Theses and Dissertations (20)
- Computer Science and Software Engineering (18)
- Theses Digitization Project (18)
- Articles (17)
- Cybersecurity Undergraduate Research Showcase (17)
- Applied Mathematics & Information Sciences (16)
- Branch Mathematics and Statistics Faculty and Staff Publications (16)
- Computer Science Faculty Publications and Presentations (16)
- Publication Type
Articles 1 - 30 of 2125
Full-Text Articles in Computer Engineering
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
Enhancing Cybersecurity Learning Efficiency: Leveraging Spaced Repetition Systems For Rapid Adaptation, Takudzwanashe Nyabadza
Enhancing Cybersecurity Learning Efficiency: Leveraging Spaced Repetition Systems For Rapid Adaptation, Takudzwanashe Nyabadza
Research Week
No abstract provided.
Secure Cislunar Communication Architecture: Cryptographic Capabilities And Protocols For Lunar Missions, Michael Hamblin, Bilal Abu Bakr
Secure Cislunar Communication Architecture: Cryptographic Capabilities And Protocols For Lunar Missions, Michael Hamblin, Bilal Abu Bakr
Research Week
The surge in lunar missions intensifies concerns about congestion and communication reliability. This study proposes a secure cislunar architecture for real-time, cross-mission information exchange. We focus on cryptographic protocols and network design for a native IPv6 cislunar transit system.
Through a review of internet and space communication advancements, we emphasize the need for a secure network, exemplified by LunaNet. A robust data transit system with encryption is crucial for a common communication infrastructure. Traditional protocols face latency challenges. We advocate for user-friendly encryption methods to address confidentiality within the CIA Triad. Integrity is maintained through cryptographic message authentication codes. Availability …
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
LSU Master's Theses
Industrial Control Systems (ICS) are the foundation of our critical infrastructure, and allow for the manufacturing of the products we need. These systems monitor and control power plants, water treatment plants, manufacturing plants, and much more. The security of these systems is crucial to our everyday lives and to the safety of those working with ICS. In this thesis we examined how an attacker can take control of these systems using a power plant simulator in the Applied Cybersecurity Lab at LSU. Running experiments on a live environment can be costly and dangerous, so using a simulated environment is the …
Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer
Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer
ELAIA
Asteroid detection is a common field in astronomy for planetary defense, requiring observations from survey telescopes to detect and classify different objects. The amount of data collected each night is continually increasing as new and better-designed telescopes begin collecting information each year. This amount of data is quickly becoming unmanageable, and researchers are looking for ways to better process this data. The most feasible current solution is to implement computer algorithms to automatically detect these sources and then use machine learning to create a more efficient and accurate method of classification. Implementation of such methods has previously focused on larger …
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
5G networks and Mobile Edge Computing (MEC) are two main pillars of the next technological revolution. The first pillar provides ultra-reliable, high-bandwidth connectivity with ultra-low latency, while the second pillar gives mobile networks cloud computing capabilities at the edge of the network, enabling compute-dense, context-aware services for mobile users. So the next generation of mobile networks will see close integration between computing and communication. Therefore, it was necessary to study the different deployment options for edge hosts in 5G network, to know the effect of those options on the overall performance of the network. In this research, (Omnetpp 6.0) network …
Emoji Use In Social Media Posts: Relationships With Personality Traits And Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, Eric Chan-Tin
Emoji Use In Social Media Posts: Relationships With Personality Traits And Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
Prior research has demonstrated relationships between personality traits of social media users and the language used in their posts. Few studies have examined whether there are relationships between personality traits of users and how they use emojis in their social media posts. Emojis are digital pictographs used to express ideas and emotions. There are thousands of emojis, which depict faces with expressions, objects, animals, and activities. We conducted a study with two samples (n = 76 and n = 245) in which we examined how emoji use on X (formerly Twitter) related to users’ personality traits and language use …
Fair Fault-Tolerant Approach For Access Point Failures In Networked Control System Greenhouses, Mohammed Ali Yaslam Ba Humaish
Fair Fault-Tolerant Approach For Access Point Failures In Networked Control System Greenhouses, Mohammed Ali Yaslam Ba Humaish
Theses and Dissertations
Greenhouse Networked Control Systems (NCS) are popular applications in modern agriculture due to their ability to monitor and control various environmental factors that can affect crop growth and quality. However, designing and operating a greenhouse in the context of NCS could be challenging due to the need for highly available and cost-efficient systems. This thesis presents a design methodology for greenhouse NCS that addresses these challenges, offering a framework to optimize crop productivity, minimize costs, and improve system availability and reliability. It contributes several innovations to the field of greenhouse NCS design. For example, it recommends using the 2.4GHz frequency …
Tree Localization In A Plantation Using Ultra Wideband Signals, Akshat Verma
Tree Localization In A Plantation Using Ultra Wideband Signals, Akshat Verma
The Journal of Purdue Undergraduate Research
No abstract provided.
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Posters-at-the-Capitol
Title: Securing Edge Computing: A Hierarchical IoT Service Framework
Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.
Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University
Abstract:
Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.
Our secure by design approach prioritizes …
Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, My Doan, Anh Tran, Na Le
Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, My Doan, Anh Tran, Na Le
Posters-at-the-Capitol
Abstract
Purpose: The purpose of the study is to better understand the role and impact of video research podcasts in bridging the gap between academia and the general public, especially concerning the challenges of accessibility and comprehension of scholarly research.
Methods: A 10-question survey was administered to evaluate the effectiveness, utility, and acceptance of video recordings in research presentations. The survey also aimed to gather insights into the motivations, challenges, and benefits of using video podcasts for research dissemination. Results were then analyzed using the Unified Theory of Acceptance and Use of Technology (UTAUT) model.
Results: There were 102 respondents …
Alice In Cyberspace 2024, Stanley Mierzwa
Alice In Cyberspace 2024, Stanley Mierzwa
Center for Cybersecurity
‘Alice in Cyberspace’ Conference Nurtures Women’s Interest, Representation in Cybersecurity
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
Journal of International Technology and Information Management
Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström
Journal of International Technology and Information Management
This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Journal of International Technology and Information Management
Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …
Arduino-Based High-Frequency Signal Data Acquisition For Learning Media On Antenna And Wave Propagation Practices, Eko Marpanaji, Masduki Zakarijah, Nikko Aji Bayu Nugraha
Arduino-Based High-Frequency Signal Data Acquisition For Learning Media On Antenna And Wave Propagation Practices, Eko Marpanaji, Masduki Zakarijah, Nikko Aji Bayu Nugraha
Elinvo (Electronics, Informatics, and Vocational Education)
This paper discusses the research results on the development of learning media and the results of the feasibility test for the learning process. This study aims to: (1) obtain the design and prototype of Arduino-based high-frequency signal data acquisition learning media; (2) find out the level of feasibility of learning media that has been made for the learning process of Antenna Practice and Wave Propagation courses. The research model uses Research and Development with the ADDIE development method. The research stages in the ADDIE method are Analyze, Design, Develop, Implement, and Evaluate. The research began with the development of learning …
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances
Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances
AFIT Patents
A method for cyber security monitor includes monitoring a network interface that is input-only configured to surreptitiously and covertly receive bit-level, physical layer communication between networked control and sensor field devices. During a training mode, a baseline distinct native attribute (DNA) fingerprint is generated for each networked field device. During a protection mode, a current DNA fingerprint is generated for each networked field device. The current DNA fingerprint is compared to the baseline DNA fingerprint for each networked field device. In response to detect at least one of RAA and PAA based on a change in the current DNA fingerprint …
On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez
On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez
Department of Mathematics: Dissertations, Theses, and Student Research
In order to communicate information over a noisy channel, error-correcting codes can be used to ensure that small errors don’t prevent the transmission of a message. One family of codes that has been found to have good properties is low-density parity check (LDPC) codes. These are represented by sparse bipartite graphs and have low complexity graph-based decoding algorithms. Various graphical properties, such as the girth and stopping sets, influence when these algorithms might fail. Additionally, codes based on algebraically structured parity check matrices are desirable in applications due to their compact representations, practical implementation advantages, and tractable decoder performance analysis. …
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Undergraduate Honors Theses
Satellite communication is essential for the exploration and study of space. Satellites allow communications with many devices and systems residing in space and on the surface of celestial bodies from ground stations on Earth. However, with the rise of Ground Station as a Service (GsaaS), the ability to efficiently send action commands to distant satellites must ensure non-repudiation such that an attacker is unable to send malicious commands to distant satellites. Distant satellites are also constrained devices and rely on limited power, meaning security on these devices is minimal. Therefore, this study attempted to propose a novel algorithm to allow …
Brunet: Disruption-Tolerant Tcp And Decentralized Wi-Fi For Small Systems Of Vehicles, Nicholas Brunet
Brunet: Disruption-Tolerant Tcp And Decentralized Wi-Fi For Small Systems Of Vehicles, Nicholas Brunet
Master's Theses
Reliable wireless communication is essential for small systems of vehicles. However, for small-scale robotics projects where communication is not the primary goal, programmers frequently choose to use TCP with Wi-Fi because of their familiarity with the sockets API and the widespread availability of Wi-Fi hardware. However, neither of these technologies are suitable in their default configurations for highly mobile vehicles that experience frequent, extended disruptions. BRUNET (BRUNET Really Useful NETwork) provides a two-tier software solution that enhances the communication capabilities for Linux-based systems. An ad-hoc Wi-Fi network permits decentralized peer-to-peer and multi-hop connectivity without the need for dedicated network infrastructure. …
Decentralized Machine Learning On Blockchain: Developing A Federated Learning Based System, Nikhil Sridhar
Decentralized Machine Learning On Blockchain: Developing A Federated Learning Based System, Nikhil Sridhar
Master's Theses
Traditional Machine Learning (ML) methods usually rely on a central server to per-
form ML tasks. However, these methods have problems like security risks, data
storage issues, and high computational demands. Federated Learning (FL), on the
other hand, spreads out the ML process. It trains models on local devices and then
combines them centrally. While FL improves computing and customization, it still
faces the same challenges as centralized ML in security and data storage.
This thesis introduces a new approach combining Federated Learning and Decen-
tralized Machine Learning (DML), which operates on an Ethereum Virtual Machine
(EVM) compatible blockchain. The …
Renovating The Ipmu Via Internet Of Things For Pollutant Emission Estimations In Poultry Facilities, Joshua Dotto
Renovating The Ipmu Via Internet Of Things For Pollutant Emission Estimations In Poultry Facilities, Joshua Dotto
Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research
The emissions of ammonia (NH3), particulate matter (PM2.5), and carbon dioxide (CO2) are major concerns in poultry facilities. They can pose environmental concerns and nuances. Robust and affordable measurement systems are needed to accurately measure in-barn concentrations and quantify the emissions.
The Intelligent Portable Monitoring Unit (iPMU or PMU3) developed in 2016 was reconstructed into PMU4 to include upgraded NH3 and PM2.5 sensors and wireless connectivity for a low-cost, robust, and accurate air quality monitoring device with contactless data transfer using the concept of Internet of Things (IoT). In addition, a user-friendly …
Cybersecurity In Critical Infrastructure Systems: Emulated Protection Relay, Mitchell Bylak
Cybersecurity In Critical Infrastructure Systems: Emulated Protection Relay, Mitchell Bylak
Computer Science and Computer Engineering Undergraduate Honors Theses
Cyber-attacks on Critical Systems Infrastructure have been steadily increasing across the world as the capabilities of and reliance on technology have grown throughout the 21st century, and despite the influx of new cybersecurity practices and technologies, the industry faces challenges in its cooperation between the government that regulates law practices and the private sector that owns and operates critical infrastructure and security, which has directly led to an absence of eas- ily accessible information and learning resources on cybersecurity for use in public environments and educational settings. This honors research thesis addresses these challenges by submitting the development of an …
Making Tradable White Certificates Trustworthy, Anonymous, And Efficient Using Blockchains, Nouman Ashraf, Sachin Sharma, Sheraz Aslam, Khursheed Aurangzeb
Making Tradable White Certificates Trustworthy, Anonymous, And Efficient Using Blockchains, Nouman Ashraf, Sachin Sharma, Sheraz Aslam, Khursheed Aurangzeb
Articles
Fossil fuel pollution has contributed to dramatic changes in the Earth’s climate, and this trend will continue as fossil fuels are burned at an ever-increasing rate. Many countries around the world are currently making efforts to reduce greenhouse gas emissions, and one of the methods is the Tradable White Certificate (TWC) mechanism. The mechanism allows organizations to reduce their energy consumption to generate energy savings certificates, and those that achieve greater energy savings can sell their certificates to those that fall short. However, there are some challenges to implementing this mechanism, such as the centralized and costly verification and control …
Closing The Gap: Leveraging Aes-Ni To Balance Adversarial Advantage And Honest User Performance In Argon2i, Nicholas Harrell, Nathaniel Krakauer
Closing The Gap: Leveraging Aes-Ni To Balance Adversarial Advantage And Honest User Performance In Argon2i, Nicholas Harrell, Nathaniel Krakauer
CERIAS Technical Reports
The challenge of providing data privacy and integrity while maintaining efficient performance for honest users is a persistent concern in cryptography. Attackers exploit advances in parallel hardware and custom circuit hardware to gain an advantage over regular users. One such method is the use of Application-Specific Integrated Circuits (ASICs) to optimize key derivation function (KDF) algorithms, giving adversaries a significant advantage in password guessing and recovery attacks. Other examples include using graphical processing units (GPUs) and field programmable gate arrays (FPGAs). We propose a focused approach to close the gap between adversarial advantage and honest user performance by leveraging the …
Security Datasets For Network Research, Bruce Hartpence, Bill Stackpole, Daryl Johnson
Security Datasets For Network Research, Bruce Hartpence, Bill Stackpole, Daryl Johnson
Data
This document describes the content of the security traffic datasets included in this collection and the conditions under which the packets were collected. These datasets were assembled from 2023 onward. There will be periodic updates or additions to the dataset collection. The current collection includes a variety of nmap intense scans, an Address Resolution Protocol Man in the Middle (ARP MITM) attack, an Internet Control Message Protocol (ICMP) Redirect MITM and an active directory enumeration attack.
When referencing these datasets, please use the following DOI: 10.57673/gccis-qj60
Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden
Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden
Copyright, Fair Use, Scholarly Communication, etc.
Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.
My Administration places the highest urgency …
Towards Reliable Multi-Path Routing : An Integrated Cooperation Model For Drones, Ibtihel Baddari, Abdelhak Mesbah, Maohamed Amine Riahla
Towards Reliable Multi-Path Routing : An Integrated Cooperation Model For Drones, Ibtihel Baddari, Abdelhak Mesbah, Maohamed Amine Riahla
Emirates Journal for Engineering Research
Ad-hoc networks have evolved into a vital wireless communication component by offering an adaptable infrastructure suitable for various scenarios in our increasingly interconnected and mobile world. However, this adaptability also exposes these networks to security challenges, given their dynamic nature, where nodes frequently join and leave. This dynamism is advantageous but presents resource constraints and vulnerability to malicious nodes, impacting data transmission reliability and security.
In this context, this article explores the development of a secure routing protocol for Ad-hoc networks based on a cooperation reinforcement model to reduce the degradation of routing performance. We leverage the reputation of nodes …
Data For Ai In Network Systems Workshop Report, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Data For Ai In Network Systems Workshop Report, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Workshop on Data for AI in Network Systems
No abstract provided.