Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Ahmed Ahmim"'
Publikováno v:
IEEE Access, Vol 12, Pp 105887-105905 (2024)
The coming 6G wireless network is poised to achieve unprecedented data rates, latency, and integration with newer technologies like AI and IoE. On the other hand, along with this kind of growth in the AI domain and the large-scale connectivity in 6G.
Externí odkaz:
https://doaj.org/article/60b1dd6fd650414eb80af3e6d9edcd1b
Publikováno v:
IEEE Access, Vol 11, Pp 119862-119875 (2023)
As a result of the widespread adoption of the Internet of Things, there are now hundreds of millions of connected devices, increasing the likelihood that they may be vulnerable to various types of cyberattacks. In recent years, distributed denial of
Externí odkaz:
https://doaj.org/article/e13edc3d0f5e414a9d336e8025105c8d
Publikováno v:
Future Internet, Vol 12, Iss 3, p 44 (2020)
This paper proposes a novel intrusion detection system (IDS), named RDTIDS, for Internet-of-Things (IoT) networks. The RDTIDS combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip a
Externí odkaz:
https://doaj.org/article/38900eb4631744dbb6837b89379feec2
Publikováno v:
Wireless Personal Communications. 128:1309-1324
The use of Internet key exchange protocols in IP Security architecture and in IoT environments has vulnerabilities against various malicious attacks and affects communication efficiency. To address these weaknesses, we propose a novel efficient and s
Publikováno v:
International Journal of Information Security. 21:1019-1026
Publikováno v:
2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS).
Publikováno v:
Future Internet, Vol 12, Iss 3, p 44 (2020)
Future Internet
Volume 12
Issue 3
Future Internet
Volume 12
Issue 3
open access article This paper proposes a novel intrusion detection system (IDS), named RDTIDS, for Internet-of-Things (IoT) networks. The RDTIDS combines different classifier approaches which are based on decision tree and rules-based concepts, name
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::074d715e6a55b6000dd5ec2c966d0da8
https://doi.org/10.3390/fi12030044
https://doi.org/10.3390/fi12030044
Autor:
Mohamed Amine Ferrag, Makhlouf Derdour, Ahmed Ahmim, Helge Janicke, George Drivas, Leandros A. Maglaras
Publikováno v:
Strategic Innovative Marketing and Tourism ISBN: 9783030361259
This paper presents a taxonomy of supervised machine learning techniques for intrusion detection systems (IDSs). Firstly, detailed information about related studies is provided. Secondly, a brief review of public data sets is provided, which are used
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1b9079e6b08fd45b3160526371cd4098
https://doi.org/10.1007/978-3-030-36126-6_69
https://doi.org/10.1007/978-3-030-36126-6_69
Publikováno v:
Strategic Innovative Marketing and Tourism ISBN: 9783030361259
Machine learning is more and more used in various fields of the industry, which go from the self driving car to the computer security. Nowadays, with the huge network traffic, machine learning represents the miracle solution to deal with network traf
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cfba413d392ba41eb84639588f3a118a
https://doi.org/10.1007/978-3-030-36126-6_70
https://doi.org/10.1007/978-3-030-36126-6_70
Autor:
Mohamed Amine Ferrag, Ahmed Ahmim
Publikováno v:
Telecommunication Systems. 66:481-503
In this paper, we propose an Efficient Secure routing Scheme based on searchable encryption with vehicle Proxy Re-encryption, called ESSPR, for achieving privacy preservation of message in vehicular peer-to-peer social network (VP2PSN). Specifically,