Loading…
Loading…
Survey on SDN based network intrusion detection system using machine learning approaches
Sultana, Nasrin, Chilamkurti, Naveen, Peng, Wei, Alhadad, Rabei
Published in Peer-to-peer networking and applications (01.03.2019)
Published in Peer-to-peer networking and applications (01.03.2019)
Get full text
Journal Article
Loading…
Loading…
Secure and efficient mutual authentication protocol for smart grid under blockchain
Wang, Weizheng, Huang, Huakun, Zhang, Lejun, Su, Chunhua
Published in Peer-to-peer networking and applications (01.09.2021)
Published in Peer-to-peer networking and applications (01.09.2021)
Get full text
Journal Article
Loading…
Loading…
An Optimized Byzantine Fault Tolerance Algorithm for Consortium Blockchain
Li, Yuxi, Qiao, Liang, Lv, Zhihan
Published in Peer-to-peer networking and applications (01.09.2021)
Published in Peer-to-peer networking and applications (01.09.2021)
Get full text
Journal Article
Loading…
IOT based wearable sensor for diseases prediction and symptom analysis in healthcare sector
Muthu, BalaAnand, Sivaparthipan, C. B., Manogaran, Gunasekaran, Sundarasekar, Revathi, Kadry, Seifedine, Shanthini, A., Dasel, Antony
Published in Peer-to-peer networking and applications (01.11.2020)
Published in Peer-to-peer networking and applications (01.11.2020)
Get full text
Journal Article
Loading…
Machine learning models and techniques for VANET based traffic management: Implementation issues and challenges
Khatri, Sahil, Vachhani, Hrishikesh, Shah, Shalin, Bhatia, Jitendra, Chaturvedi, Manish, Tanwar, Sudeep, Kumar, Neeraj
Published in Peer-to-peer networking and applications (01.05.2021)
Published in Peer-to-peer networking and applications (01.05.2021)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
ASFGNN: Automated separated-federated graph neural network
Zheng, Longfei, Zhou, Jun, Chen, Chaochao, Wu, Bingzhe, Wang, Li, Zhang, Benyu
Published in Peer-to-peer networking and applications (01.05.2021)
Published in Peer-to-peer networking and applications (01.05.2021)
Get full text
Journal Article
Loading…
An effective blockchain evaluation system based on entropy-CRITIC weight method and MCDM techniques
Zafar, Shakeel, Alamgir, Zareen, Rehman, M. H.
Published in Peer-to-peer networking and applications (01.09.2021)
Published in Peer-to-peer networking and applications (01.09.2021)
Get full text
Journal Article
Loading…
A resource allocation model based on double-sided combinational auctions for transparent computing
Wang, Jiaze, Liu, Anfeng, Yan, Tong, Zeng, Zhiwen
Published in Peer-to-peer networking and applications (01.07.2018)
Published in Peer-to-peer networking and applications (01.07.2018)
Get full text
Journal Article
Loading…
Loading…
Reliable scheduling and load balancing for requests in cloud-fog computing
Alqahtani, Fayez, Amoon, Mohammed, Nasr, Aida A.
Published in Peer-to-peer networking and applications (01.07.2021)
Published in Peer-to-peer networking and applications (01.07.2021)
Get full text
Journal Article
Loading…
Loading…
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks
Yousefpoor, Efat, Barati, Hamid, Barati, Ali
Published in Peer-to-peer networking and applications (01.07.2021)
Published in Peer-to-peer networking and applications (01.07.2021)
Get full text
Journal Article
Loading…
A digital rights management system based on a scalable blockchain
Garba, Abba, Dwivedi, Ashutosh Dhar, Kamal, Mohsin, Srivastava, Gautam, Tariq, Muhammad, Hasan, M. Anwar, Chen, Zhong
Published in Peer-to-peer networking and applications (01.09.2021)
Published in Peer-to-peer networking and applications (01.09.2021)
Get full text
Journal Article