The increasing adoption of autonomous vehicles has driven the need for robust data management solutions that support real-time operations and ensure vehicle safety and efficiency. This work introduces a cloud-based fr...
详细信息
Strong security measures must be integrated in an era where data security is critical, particularly for sensitive data handled by IoT devices. In order to strengthen Internet of Things security, the use of Hardware Se...
详细信息
In this paper, we propose a novel framework for leveraging digital twins to enhance ON/OFF-LINE blockchain networks in drone and IoT communication systems. The proposed solution addresses critical challenges in enviro...
详细信息
Anomaly-based Intrusion Detection Systems (IDS) playa crucial role in identifying network breaches by detecting deviations from baseline patterns. However, existing methods often struggle to accurately differentiate b...
详细信息
In today's interconnected business landscape, security is the cornerstone of all organizations, irrespective of their size or industry. This research emphasizes the critical need to safeguard organizational assets...
详细信息
This paper focuses on the digital innovation brought about by the advancement of ICT technology in the healthcare field. In particular, the introduction of cutting-edge technologies such as AI are contributing to the ...
详细信息
In the realm of cybersecurity and network security, the significance of monitoring and analyzing network traffic cannot be overstated Network packet sniffing, a technique employed to capture and inspect data packets t...
详细信息
Individual learning style offer insights to both students and teachers to effectively organize learning activities and materials accordingly to optimize learning process. Learning style defined students' preferred...
详细信息
In anticipation of the 5G-Advanced and 6G era, this paper explores Open RAN as an innovative solution to enhance the existing Radio Access Network (RAN) capabilities, particularly in managing the surge in mobile traff...
详细信息
Anomaly detection plays a pivotal role in network traffic and intrusion systems. Several Evolutionary Algorithms (EAs) have been employed to address this challenge. This paper presents a comparative analysis of variou...
详细信息
暂无评论