106   Artículos

 
en línea
Bing Su and Jiwu Liang    
With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and sec... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zengyu Cai, Chunchen Tan, Jianwei Zhang, Liang Zhu and Yuan Feng    
As network technology continues to develop, the popularity of various intelligent terminals has accelerated, leading to a rapid growth in the scale of wireless network traffic. This growth has resulted in significant pressure on resource consumption and ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ruslans Babajans, Darja Cirjulina, Filips Capligins, Deniss Kolosovs and Anna Litvinenko    
The current work is focused on studying the performance of the Pecora?Carroll synchronization technique to achieve synchronization between the analog and discrete chaos oscillators. The importance of this study is supported by the growing applications of... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xingyuan Yang, Jie Yuan, Hao Yang, Ya Kong, Hao Zhang and Jinyu Zhao    
In this paper, considering the problem that the common defensive means in the current cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn reactive into proactive to deal with the increasingly serious cyberspace securi... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ola N. Halawi, Faisal N. Abu-Khzam and Sergio Thoumi    
Enormous amounts of data collected from social networks or other online platforms are being published for the sake of statistics, marketing, and research, among other objectives. The consequent privacy and data security concerns have motivated the work o... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Gerardo Hernández-Oregón, Mario E. Rivero-Angeles, Juan C. Chimal-Eguía and Jorge E. Coyac-Torres    
Peer-to-Peer (P2P) networks have emerged as potential solutions to issues that cause inefficient download times in networks because they can use the resources in the entire network, allowing nodes to act both as servers and clients simultaneously. Common... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Messaoud Benguenane, Ahmed Korichi, Bouziane Brik and Nadjet Azzaoui    
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due to the distinct characteristics of such networks, such as their highly dynamic topology and frequent connectivity disruptions. Jellyfish attacks are a sort of... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yi Zhang, Lanxin Qiu, Yangzhou Xu, Xinjia Wang, Shengjie Wang, Agyemang Paul and Zhefu Wu    
Software-Defined Networking (SDN) enhances network control but faces Distributed Denial of Service (DDoS) attacks due to centralized control and flow-table constraints in network devices. To overcome this limitation, we introduce a multi-path routing alg... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jianjun Wu, Yuxue Hu, Zhongqiang Huang, Junsong Li, Xiang Li and Ying Sha    
Link prediction is a critical prerequisite and foundation task for social network security that involves predicting the potential relationship between nodes within a network or graph. Although the existing methods show promising performance, they often i... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Muneerah Al Asqah and Tarek Moulahi    
The Internet of Things (IoT) compromises multiple devices connected via a network to perform numerous activities. The large amounts of raw user data handled by IoT operations have driven researchers and developers to provide guards against any malicious ... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 7     Siguiente »