The rise of decentralized identity systems has posed significant challenges in the secure and scalable management of keys, especially in large-scale national identity programs. In this paper, we propose a new secure a...
详细信息
The widely used Java library Log4j logging framework has lately come under attack from a major vulnerability known as CVE-2021–44228, also known as Log4Shell. Through the use of malicious log messages, the vulnerabil...
详细信息
Intrusion detection systems (IDS) are crucial for safeguarding against the increasing cyber threats. This research study proposes an ensemble-based machine learning approach to effectively detect anomalies in network ...
详细信息
In the realm of cybersecurity and network security, the significance of monitoring and analyzing network traffic cannot be overstated Network packet sniffing, a technique employed to capture and inspect data packets t...
详细信息
Intrusion Detection Systems (IDS) have been significant for Unmanned Aerial Vehicles (UAVs) since high connectivity is essential for such vehicles. Recently, machine learning-based defense mechanisms have contributed ...
详细信息
A large portion of the world's healthcare issues are related to conditions that impact the chest, heart, lungs, and respiratory system, which affect millions of people annually. To address this issue, we present t...
详细信息
The increasing prevalence of brain degenerative disorders particularly Alzheimer's and Parkinson's, have incurred a dire need for effective diagnostic methodologies. With advancements in medical imaging techni...
详细信息
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly *** have been attem...
详细信息
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly *** have been attempts to utilize Digital Twins(DTs)to facilitate the design,evaluation,and deployment of IoV-based systems,for example by supporting high-fidelity modeling,real-time monitoring,and advanced predictive ***,the literature review undertaken in this paper suggests that integrating DTs into IoV-based system design and deployment remains an understudied *** addition,this paper explains how DTs can benefit IoV system designers and implementers,as well as describes several challenges and opportunities for future researchers.
An advanced hybrid renewable energy collecting and storage system prototype that utilizes water flow as its primary power source. Additionally, the system incorporates an energy monitoring system based on the Internet...
详细信息
In VANETs, the important and effective applications of vehicle localization include safety and communication applications. Thus, it is difficult to get very accurate localization in the dynamic and often very fluctuat...
详细信息
暂无评论