Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Abbas Robert"'
Autor:
Shakya, Sushil, Abbas, Robert
This paper presents the detection of DDoS attacks in IoT networks using machine learning models. Their rapid growth has made them highly susceptible to various forms of cyberattacks, many of whose security procedures are implemented in an irregular m
Externí odkaz:
http://arxiv.org/abs/2411.05890
Autor:
Wang Liwei, Abbas Robert, Almansour Fahad M., Gaba Gurjot Singh, Alroobaea Roobaea, Masud Mehedi
Publikováno v:
Journal of Intelligent Systems, Vol 30, Iss 1, Pp 592-603 (2021)
With the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security vulne
Externí odkaz:
https://doaj.org/article/799e3428504b4e6da93b47baf739df6d
Autor:
D'Costa, Daryll Ralph, Abbas, Robert
The world is moving into a new era with the deployment of 5G communication infrastructure. Many new developments are deployed centred around this technology. One such advancement is 5G Vehicle to Everything communication. This technology can be used
Externí odkaz:
http://arxiv.org/abs/2202.00005
The acceptance of Internet of Things (IoT) applications and services has seen an enormous rise of interest in IoT. Organizations have begun to create various IoT based gadgets ranging from small personal devices such as a smart watch to a whole netwo
Externí odkaz:
http://arxiv.org/abs/2104.02231
Autor:
Ali, Samad, Saad, Walid, Rajatheva, Nandana, Chang, Kapseok, Steinbach, Daniel, Sliwa, Benjamin, Wietfeld, Christian, Mei, Kai, Shiri, Hamid, Zepernick, Hans-Jürgen, Chu, Thi My Chinh, Ahmad, Ijaz, Huusko, Jyrki, Suutala, Jaakko, Bhadauria, Shubhangi, Bhatia, Vimal, Mitra, Rangeet, Amuru, Saidhiraj, Abbas, Robert, Shao, Baohua, Capobianco, Michele, Yu, Guanghui, Claes, Maelick, Karvonen, Teemu, Chen, Mingzhe, Girnyk, Maksym, Malik, Hassan
The focus of this white paper is on machine learning (ML) in wireless communications. 6G wireless communication networks will be the backbone of the digital transformation of societies by providing ubiquitous, reliable, and near-instant wireless conn
Externí odkaz:
http://arxiv.org/abs/2004.13875
Autor:
Ylianttila, Mika, Kantola, Raimo, Gurtov, Andrei, Mucchi, Lozenzo, Oppermann, Ian, Yan, Zheng, Nguyen, Tri Hong, Liu, Fei, Hewa, Tharaka, Liyanage, Madhusanka, Ijaz, Ahmad, Partala, Juha, Abbas, Robert, Hecker, Artur, Jayousi, Sara, Martinelli, Alessio, Caputo, Stefano, Bechtold, Jonathan, Morales, Ivan, Stoica, Andrei, Abreu, Giuseppe, Shahabuddin, Shahriar, Panayirci, Erdal, Haas, Harald, Kumar, Tanesh, Ozparlak, Basak Ozan, Röning, Juha
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and
Externí odkaz:
http://arxiv.org/abs/2004.11665
Wireless Local Area Networks (WLANs), known as Wi-Fi, have become an essential service in university environments that helps staff, students and guests to access connectivity to the Internet from their mobile devices. Apart from the Internet being a
Externí odkaz:
http://arxiv.org/abs/2004.01561
Autor:
Curry, Tristan, Abbas, Robert
When planning a 5G network in the sub-6GHz bands, similar cell planning techniques to LTE can be applied. Looking at the Australian environment, the n78 band (3.3-3.8GHz TDD) is approximately 1GHz higher than the 2.6GHz band used in existing LTE netw
Externí odkaz:
http://arxiv.org/abs/2003.09574
Autor:
Lam, Jordan, Abbas, Robert
Protecting the networks of tomorrow is set to be a challenging domain due to increasing cyber security threats and widening attack surfaces created by the Internet of Things (IoT), increased network heterogeneity, increased use of virtualisation tech
Externí odkaz:
http://arxiv.org/abs/2003.03474
Autor:
Dibaei, Mahdi, Zheng, Xi, Jiang, Kun, Maric, Sasa, Abbas, Robert, Liu, Shigang, Zhang, Yuexin, Deng, Yao, Wen, Sheng, Zhang, Jun, Xiang, Yang, Yu, Shui
Cyber security is one of the most significant challenges in connected vehicular systems and connected vehicles are prone to different cybersecurity attacks that endanger passengers' safety. Cyber security in intelligent connected vehicles is composed
Externí odkaz:
http://arxiv.org/abs/1907.07455