Abstract is missing.
- Trust-Based Security for Decentralized Clustering in IoVChandler Scott, Mohammad S. Khan, Biju Bajracharya, Anirudh Paranjothi. 1-4 [doi]
- On the Performance of Malware Detection Classifiers Using Hardware Performance CountersAlireza Abolhasani Zeraatkar, Parnian Shabani Kamran, Inderpreet Kaur, Nagabindu Ramu, Tyler Sheaves, Hussain Al-Asaad. 1-6 [doi]
- Scalable Video Streaming Solutions Using Federated LearningMahmoud Darwich, Kasem Khalil, Magdy A. Bayoumi. 1-6 [doi]
- An Object-Based Detection Approach for Automating City Accessibility Constraints MappingSérgio Moita, Rui S. Moreira, Feliz Gouveia, José M. Torres 0001, Maria Simas Guerreiro, Diogo Ferreira, Sara Sucena, Maria Alzira Dinis. 1-7 [doi]
- Lightweight Intrusion Detection System with GAN-Based Knowledge DistillationTarek Ali, Amna Eleyan, Tarek Bejaoui, Mohammed Al-Khalidi. 1-7 [doi]
- A Robust Federated Learning Approach for Combating Attacks Against IoT Systems Under Non-IID ChallengesEyad Gad, Zubair Md. Fadlullah, Mostafa M. Fouda. 1-6 [doi]
- A Systematic Review of the Use of Computer Vision and Photogrammetry Tools in Learning-Based Dimensional Road Pavement Defect Detection for Smart TransportationAdamu Ibrahim Tafida, Noor Amila Bt Wan Zawawi, Wesam Salah Alaloul, Muhammad Ali Musarat. 1-9 [doi]
- AI Approaches for Predictive Maintenance in Road Bridge InfrastructureAmisha Gunderia, Priyansh Agarwal, Valmik B. Nikam, A. N. Bambole. 1-6 [doi]
- Blender-GAN: Multi-Target Conditional Generative Adversarial Network for Novel Class Synthetic Data GenerationAkshayraj Madhubalan, Amit Gautam, Priya Tiwary. 1-7 [doi]
- Transfer Learning Enhanced Deep Learning Model for Wildfire Flame and Smoke DetectionGiovanny Vazquez, Shengjie Zhai, Mei Yang. 1-4 [doi]
- Technologies Behind the Humanitarian Demining: A ReviewMahamat Ismael Hassan, Daouda Ahmat, Samuel Ouya. 1-7 [doi]
- Lightweight Zero Knowledge Proof-Based Multi Access Control Schema for Smart Telehealth SystemWassila Lalouani, Lloyd Emokpae. 1-6 [doi]
- IoT-Based Automated Farmland Contamination Monitoring SystemsLizbeth He, Xiang Sun. 1-6 [doi]
- Combating Malware Traffic in Emerging Networks: A Collaborative Learning ApproachHarshith Vaitla, Gad Gad, Zubair Md. Fadlullah, Mostafa M. Fouda. 1-6 [doi]
- South African Manufacturing Industry in the Aeon of Artificial IntelligenceNdala Yves Mulongo. 1-5 [doi]
- A Data-Driven Model for Wildfire Prediction in CaliforniaBrennon Hahs, Kanika Sood, Desiree Gomez. 1-6 [doi]
- Enhancing Phishing Detection Through Ensemble Learning and Cross-ValidationSamer Kadhim Jawad, Satea Hikmat Alnajjar. 1-7 [doi]
- Graph-Based Access Point Switch On/Off Schemes for Energy-Efficient Cell-Free MIMOMariam Mussbah, Stefan Schwarz, Markus Rupp. 1-6 [doi]
- Unmanned Aerial Vehicles in Peril: Investigating and Addressing Cyber Threats to UAVsAlma Oracevic, Ahmad Salman. 1-7 [doi]
- Deep Learning-Based Throughput Prediction in 5G Cellular NetworksIqra Batool, Mostafa M. Fouda, Zubair Md. Fadlullah. 1-6 [doi]
- VLC-LE: Energy-Efficient and Secure Visible Light Communication for the Internet of BodiesKavya Agarwal, Ritesh Lalwani, U. Abeena, Kurian Polachan. 1-6 [doi]
- Reflexive Forwarding: Way Forward for Communications in an Information-centric IoT?Asanga Udugama, Sneha Kulkarni, Thenuka Karunathilake, Anna Förster. 1-8 [doi]
- Digital Innovation in Water Governance: Exploring the Synergy of Digital Twins and BlockchainPrakash Agarwal, Rajendra Hegadi, Prathamesh P. Pai, Sudeepto Chatterjee, Siddhant Dixit. 1-7 [doi]
- Quantum Broadcast By Entanglement SwappingAli Hamzah Abbas, Yousif Samer Mudhafar, Akram Talib Kareem, Waleed Abed Abohana. 1-5 [doi]
- Access Control Attacks Against IoT Smart Devices: A Case StudySumesh J. Philip, Fnu Amisha, Fnu Kamesh. 1-7 [doi]
- Traffic-Aware Network Slicing for 5G Networks in Cloud Fog-RAN over WDM ArchitectureMuhammad Ahsan, Ashfaq Ahmed, Sabit Ekin, John F. O'Hara, Arsalan Ahmad. 1-6 [doi]
- Network Traffic Analysis of Medical DevicesNowfel Mashnoor, Batyr Charyyev. 1-6 [doi]
- Game-Theoretic Method for Optimal Initial Allocation of Honeypots for Enhanced Network SecurityHamidreza Asefi-Ghamari, Murtadha Hassani, Imad Mahgoub. 1-7 [doi]
- Accurate Estimation of Individual Transmission Rates Through Contact Analytics Using UWB Based Indoor Location DataRavi Chandra Thota, Sarawat Murtaza Sara, Md. Yusuf Sarwar Uddin, Majid Bani-Yaghoub, Gary Sutkin. 1-8 [doi]
- Industry 5.0 a Novel Technological ConceptNdala Yves Mulongo. 1-6 [doi]
- Securing IoT Surveillance Airport InfrastructureCatalina Aranzazu Suescun, Luis Felipe Zapata Rivera, Owen Guerra-Mondragon Saenz, Jacob Michael Christensen. 1-7 [doi]
- Multi-Critics Generative Adversarial Networks for Imbalanced Data in Intrusion Detection SystemHaofan Wang, Farah I. Kandah. 1-6 [doi]
- HDRL-IDS: A Hybrid Deep Reinforcement Learning Intrusion Detection System for Enhancing the Security of Medical Applications in 5G NetworksAli Ghubaish, Zebo Yang, Raj Jain. 1-6 [doi]
- Energy Efficient Data Routing for IoT Networks Using Genetic AlgorithmFarzana Akhter, Joseph P. Near. 1-8 [doi]
- A Feasible Railyard Automation Solution for Freight Railroad operatorsKshitij Saxena. 1-6 [doi]
- Design and Simulation of Microstrip Patch Antenna with Defected Ground Structure for Satellite Application in Ku BandRamesh Deshpande, B. Rama Sanjeeva Reddy, Jayshree Das, B. Naresh Kumar, Sanjay Dubey, Srinivas Gutthi. 1-4 [doi]
- Enhancing the Efficiency of Healthcare Facilities Management with Digital TwinsJameela Al-Jaroodi, Nader Mohamed. 1-5 [doi]
- Quantum Annotated AI Modelling of Digital AssetsGautam Siwach, Abhishek Jain. 1-6 [doi]
- Detection of Zero-Day Attacks on IoTShay Reardon, Murtadha D. Hssayeni, Imadeldin Mahgoub. 1-5 [doi]
- Privacy-Preserving Randomized-MAC WiFi Client Counting with Short-Term-Coherent Waveform Features and a Bayesian Information CriterionFeifei Yang, Xiying Zuo, Bruce Denby. 1-5 [doi]
- Scheme of Quantum Controlled Teleportation with Authentication StepWaleed Abed Abohana, Yousif Samer Mudhafar, Akram Talib Kareem, Haider Salih Mahdi, Ali Hamzah Abbas. 1-6 [doi]
- Transforming Military Security: Quantum Age Blockchain Architecture for IoBT - PARSKürsat Çakal, Suat Özdemir. 1-6 [doi]
- Channel Estimation for mmWave MIMO Using Sub-6 GHz Out-of-Band InformationFaruk Pasic, Markus Hofer, Mariam Mussbah, Sebastian Caban, Stefan Schwarz, Thomas Zemen, Christoph F. Mecklenbräuker. 1-6 [doi]
- Mutual Authentication Protocol using ECC and Hardware Security Module for IoT DevicesSuk-Jin Lee, Ahmad Salman, Hsuan-Yun Chang. 1-6 [doi]
- Did ChatGPT Exterminate the Writer, Translator, Reviewer and Journalist Professions in Brazil?Adriano Silva. 1-4 [doi]
- End-to-End System Level Solution for DDoS Attack Detection and Prediction for 5G and Future Wireless NetworksAnmol Agarwal, Rakshesh P. Bhatt, Clifton Fernandes. 1-7 [doi]
- A Framework for Energy-Efficient Manufacturing using Digital TwinsNader Mohamed, Jameela Al-Jaroodi. 1-5 [doi]
- Optimizing Cloud-Native Services with SAGA: A Service Affinity Graph-Based ApproachHai Dinh-Tuan, Franz Florian Six. 1-6 [doi]
- Market Study and User-Friendly Enablement of 4G/5G LAN-Like Connectivity for SOHO CustomersDirk Henrici, Andreas Boose. 1-4 [doi]
- A Robust Physical Layer IDS for Intra-Vehicle Communication SecurityWassila Lalouani, Ivan Omorogbe, Christopher Dube, Mohamed Baza, Amar Rasheed, Kim-Kwang Raymond Choo. 1-6 [doi]
- Optimizing Feature Panels for Effective Model Training Toward Early Diagnosis of Alzheimer's DiseaseAsif Rasheed, Zubair Md. Fadlullah, Mostafa M. Fouda. 1-6 [doi]
- Adaptive Segmentation: A Tradeoff Between Packet-Size Obfuscation and PerformanceMnassar Alyami, Cliff C. Zou, Yan Solihin. 1-4 [doi]
- The Road to Web 3.0: Empirical Insights into Full Node Workload in the Bitcoin BlockchainSayed Erfan Arefin, Abdul Serwadda. 1-6 [doi]
- Best Practices Implementing AIOps in Large OrganizationsWallace C. Potts, Christopher Carver. 1-5 [doi]
- Towards a Reliable French Speech Recognition Tool for an Automated Diagnosis of Learning DisabilitiesJihene Rezgui, Félix Jobin, Younes Kechout, Chritine Turgeon, Foutse Khomh. 1-6 [doi]
- Optimizing VNF Migration in B5G Core Networks: A Machine Learning ApproachBrahma Reddy Tanuboddi, Gad Gad, Zubair Md. Fadlullah, Mostafa M. Fouda. 1-5 [doi]
- Bidirectional Quantum Teleportation By Simultaneously Sending A Secret Classic Bit From Both SidesAkram Talib Kareem, Yousif Samer Mudhafar, Waleed Abed Abohana, Haider Salih Mahdi, Ali Hamzah Abbas. 1-6 [doi]
- Whisper-Key Location Verification Method in Cognitive Radio NetworksJoseph Tolley, Carl B. Dietrich. 1-7 [doi]
- Internet of Things Focused Optimal Distance and Boundary Algorithm for Smart CitiesVinod Kumar Verma. 1-4 [doi]
- Securing Smart Grids: Deep Reinforcement Learning Approach for Detecting Cyber-AttacksAhmed T. El-Toukhy, Islam Elgarhy, Mahmoud M. Badr, Mohamed Mahmoud 0001, Mostafa M. Fouda, Mohamed I. Ibrahem, Fathi Amsaad 0001. 1-6 [doi]
- iCuSMAT-DT: A Two-Tier Detection Mechanism for High-Rate DDoS Attacks and Discriminating Benign Flash Traffic in Software-Defined NetworksAnam Rajper, Norlina Binti Paraman, Muhammad Nadzir Marsono, Noor Jahan Rajper. 1-8 [doi]
- SecureConsent: A Blockchain-Based Dynamic and Secure Consent Management for Genomic Data SharingIbrahim Tariq Javed, Victoria L. Lemieux, Dean A. Regier. 1-7 [doi]
- Heart Disease Prediction Using Machine Learning AlgorithmsDina Jrab, Derar Eleyan, Amna Eleyan, Tarek Bejaoui. 1-8 [doi]
- Pareto-Optimal Machine Learning Models for Security of IoT ApplicationsXin-Wen Wu, Yongtao Cao, Richard Dankwa. 1-6 [doi]
- Expandable Mix-Zones as a Deception Technique for Providing Location Privacy on Internet-of-Battlefield Things (IoBT)Ismail Butun, Imad Mahgoub. 1-7 [doi]
- Enhancing Diabetes Prediction Based on Pair-Wise Ensemble Learning Model SelectionAhmed F. Ashour, Mostafa M. Fouda, Zubair Md. Fadlullah, Mohamed I. Ibrahem. 1-6 [doi]
- Deep Deterministic Policy Gradient-Based Load Balancing Method in SDN EnvironmentsYunhwan Jeong, Junghyun Lim, Geunkyung Choi, Byeong-hee Roh. 1-6 [doi]
- Data-Driven Intelligent Outage Management for High Shadowing Environments in 5G&B NetworksWaseem Raza, Muhammad Umar Bin Farooq, Aneeqa Ijaz, Ali Imran 0001. 1-6 [doi]
- Energy Harvesting Integration with Air Quality Monitoring SystemsE. S. Santana, L. A. O. Arenas, E. V. Liberado. 1-4 [doi]
- Data-Driven End-to-End Lighting Automation Based on Human Residential Trajectory AnalysisJack Zhu, Jingwen Tan, Wencen Wu. 1-6 [doi]
- IoT-Based Plant Disease Detection using Machine Learning: A Systematic Literature ReviewAbdallah Mohammad, Derar Eleyan, Amna Eleyan, Tarek Bejaoui. 1-7 [doi]
- CRANE: A Genuine Framework based on Verifiable Searchable Encryption Security and Resource Constraints Balancing on Client SideMarius Iulian Mihailescu, Stefania Loredana Nita, Valentina Marascu. 1-6 [doi]
- Redefining Teaching and Learning Practices in the Post-Covid-19 Pandemic EraNdala Yves Mulongo. 1-6 [doi]
- Automated Load Identification and Consumption Prediction for Smart Energy MetersNadine Danielle Reyes, Russtin Tolentino, Nestor Michael C. Tiglao. 1-7 [doi]
- CareCompanion: A Personalized Virtual Assistant for Enhancing Support and Independence in ADRD Patients and Older AdultsWordh Ul Hasan, Kimia Tuz Zaman, Mohammed Shalan, Xin Wang, Juan Li, Bo Xie 0001, Cui Tao. 1-10 [doi]
- Application of Machine Learning In The South African Process IndustryNdala Yves Mulongo. 1-5 [doi]
- Deployment of Next-Gen 5G NSA Networks for Awareness Campaigns in Rural AfricaMamadou Ba, Thierry Kondengar, Abagana Mahamat Kachallah, Ibrahima Ngom, Samuel Ouya, Mbaye Ndiaye Samb. 1-6 [doi]
- Short-Term Load Forecasting Employing Recurrent Neural NetworksTanzim Mostafa, Mostafa M. Fouda, Mohammad G. Abdo. 1-6 [doi]
- SCADA-Wireshark Testbed Data-Based Exploratory Data Analytics and Intrusion DetectionHillol Biswas, Muthyala Manoj Kumar. 1-6 [doi]
- Improved YOLOv5s Lightweight Vehicle Axle Recognition ModelQiuyang Feng, Fuxiang Chen, Xingle Feng. 1-6 [doi]
- Provably Correct SGD-Based Exploration for Generalized Stochastic Bandit ProblemJialin Dong, Jiayi Wang, Lin F. Yang. 1-6 [doi]
- MedCore: Intelligent Diagnostics for an Integrated Healthcare ExperienceAlzahraa Alsenani, Cady Alsuhibani, Yousra Almathami, Leen Aldekhayyel, Fatoon Alshaiddi. 1-7 [doi]
- Assessing Cooperative Trust-Based Authentication within Micro Vehicular CloudsPuya Ghazizadeh, Pushpa Choudhury, Brandon Singh, Alireza Ebrahimi. 1-6 [doi]
- Autoencoder-K-Means Algorithm for Efficient Anomaly Detection to Improve Space OperationsHamid Akbarian, Imadeldin Mahgoub, Andre Williams. 1-6 [doi]
- Unlocking the Path Towards Automation of Tiny Machine Learning for Edge ComputingGeorgios Samaras, Marinela Mertiri, Maria-Evgenia Xezonaki, Nikolaos Psaromanolakis, Vasileios Theodorou, Theodoros Bozios. 1-6 [doi]
- ASDWL: Mitigating DNS Random Subdomain Attacks for Second Level DomainLanlan Pan, Ruonan Qiu, Minghui Yang. 1-4 [doi]
- Applying Reservoir Computing and Machine Learning Techniques for Image Enhancement in Biomedical ImagingAndre Slonopas, Adam Beatty, Yenni Djajalaksana. 1-7 [doi]
- A Random Early Detection Approach for Capacity Policing in Wireless Backhaul NetworksKonrad Horbach, Mathias Kretschmer. 1-4 [doi]
- Proof of Concept: TIs over Bluetooth ImplementationHassane Aissaoui-Mehrez. 1-4 [doi]
- Short-Term Load Forecasting Using GRU-LGBM FusionShijon Das, Mostafa M. Fouda, Mohammad G. Abdo. 1-6 [doi]
- The Transformative Impact of Cloud Computing on Small and Medium-sized Enterprises (SMEs): A Comprehensive AnalysisOduwunmi Odukoya. 1-5 [doi]