Zobrazeno 1 - 10
of 67
pro vyhledávání: '"İsmail Butun"'
Autor:
Ismail Butun, Imadeldin Mahgoub
Publikováno v:
IEEE Access, Vol 12, Pp 149647-149661 (2024)
Internet of Battlefield Things (IoBT) is one of the latest technological advancements in combat-aid services, designed to enhance the battlefield operations of elite teams, such as seals and special operation units. Based on the general concept of th
Externí odkaz:
https://doaj.org/article/5298f7802ed94a639ed0868fb1621215
Publikováno v:
IEEE Access, Vol 11, Pp 68301-68315 (2023)
Owing to the geographically scattered end devices (EDs) in long-range wide area networks (LoRaWAN), devices that combat challenging cyber threats and attacks are of critical significance. In this perspective, LoRa Alliance® is continuously evolving
Externí odkaz:
https://doaj.org/article/59dddaaad9bb427e8d2ef97d68311bb1
Autor:
Manel Khelifi, Ismail Butun
Publikováno v:
IEEE Access, Vol 10, Pp 65206-65220 (2022)
The unprecedented proliferation of Unmanned Aerial Vehicles (UAVs), and Swarm Unmanned Aerial Vehicles (SUAVs) have garnered considerable attention from industry and academia owing to their extensive landscape of applications from disaster relief tow
Externí odkaz:
https://doaj.org/article/1fbb8aaadad947e0bc048298bc956df1
Publikováno v:
Sensors, Vol 23, Iss 20, p 8477 (2023)
In this paper, a novel feature generator framework is proposed for handwritten digit classification. The proposed framework includes a two-stage cascaded feature generator. The first stage is based on principal component analysis (PCA), which generat
Externí odkaz:
https://doaj.org/article/e61752308cf04568bc13c3f011a37c42
Autor:
Ismail Butun, Patrik Osterberg
Publikováno v:
IEEE Access, Vol 9, Pp 5428-5441 (2021)
As the Internet of Things (IoT) paradigm gets more attention from academia and industry, implementation tools of IoT will be explored more and more. One example is the applicability of blockchain systems to provide security and privacy of IoT network
Externí odkaz:
https://doaj.org/article/ce18accdee2041e691e0c057b49e71df
Publikováno v:
Sensors, Vol 23, Iss 2, p 1004 (2023)
This article investigates and discusses challenges in the telecommunication field from multiple perspectives, both academic and industry sides are catered for, surveying the main points of technological transformation toward edge-cloud continuum from
Externí odkaz:
https://doaj.org/article/3d2fc268fe274b229496b5dd502813e3
Autor:
Ali Mohamed, Franz Wang, Ismail Butun, Junaid Qadir, Robert Lagerström, Paolo Gastaldo, Daniele D. Caviglia
Publikováno v:
Sensors, Vol 22, Iss 9, p 3498 (2022)
The Internet of Things (IoT) has disrupted the IT landscape drastically, and Long Range Wide Area Network (LoRaWAN) is one specification that enables these IoT devices to have access to the Internet. Former security analyses have suggested that the g
Externí odkaz:
https://doaj.org/article/b849f91cd80b4e6f9e10d0a83b176e44
Publikováno v:
Sensors, Vol 21, Iss 23, p 8010 (2021)
This paper investigates and proposes a solution for Protocol Independent Switch Architecture (PISA) to process application layer data, enabling the inspection of application content. PISA is a novel approach in networking where the switch does not ru
Externí odkaz:
https://doaj.org/article/a9b472cdece349c6b5c483e5fa2809b5
Publikováno v:
Sensors, Vol 20, Iss 18, p 5166 (2020)
Continuous development of the Industrial Internet of Things (IIoT) has opened up enormous opportunities for the engineers to enhance the efficiency of the machines. Despite the development, many industry administrators still fear to use Internet for
Externí odkaz:
https://doaj.org/article/df46c1fb617e4c3c921d300bb8b43b52
Publikováno v:
Sensors, Vol 15, Iss 11, Pp 28960-28978 (2015)
In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) “downward-IDS (D-IDS)” to de
Externí odkaz:
https://doaj.org/article/9d39e82e3c874f1b927e72cfa7dedbaa