Zobrazeno 1 - 10
of 225
pro vyhledávání: '"Dutta, Ashutosh"'
Autor:
Alam, Khurshid, Habibi, Mohammad Asif, Tammen, Matthias, Krummacker, Dennis, Saad, Walid, Di Renzo, Marco, Melodia, Tommaso, Costa-Pérez, Xavier, Debbah, Mérouane, Dutta, Ashutosh, Schotten, Hans D.
Open-radio access network (O-RAN) seeks to establish principles of openness, programmability, automation, intelligence, and hardware-software disaggregation with interoperable interfaces. It advocates for multi-vendorism and multi-stakeholderism with
Externí odkaz:
http://arxiv.org/abs/2405.03555
Collisions, crashes, and other incidents on road networks, if left unmitigated, can potentially cause cascading failures that can affect large parts of the system. Timely handling such extreme congestion scenarios is imperative to reduce emissions, e
Externí odkaz:
http://arxiv.org/abs/2305.09600
Development of autonomous cyber system defense strategies and action recommendations in the real-world is challenging, and includes characterizing system state uncertainties and attack-defense dynamics. We propose a data-driven deep reinforcement lea
Externí odkaz:
http://arxiv.org/abs/2302.01595
Autor:
Chaoub, Abdelaali, Mämmelä, Aarne, Martinez-Julia, Pedro, Chaparadza, Ranganai, Elkotob, Muslim, Ong, Lyndon, Krishnaswamy, Dilip, Anttonen, Antti, Dutta, Ashutosh
Self-organizing networks (SONs) need to be endowed with self-coordination capabilities to manage the complex relations between their internal components and to avoid their destructive interactions. Existing communication technologies commonly impleme
Externí odkaz:
http://arxiv.org/abs/2112.09769
With the increasing system complexity and attack sophistication, the necessity of autonomous cyber defense becomes vivid for cyber and cyber-physical systems (CPSs). Many existing frameworks in the current state-of-the-art either rely on static model
Externí odkaz:
http://arxiv.org/abs/2104.08994
Autor:
Rajbanshi, Biplab, Dutta, Ashutosh, Mahato, Beauty, Roy, Debadrita, Maiti, Dilip Kumar, Bhattacharyya, Subires, Roy, Mahendra Nath
Publikováno v:
In Journal of Molecular Liquids 15 January 2020 298
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Dutta, Ashutosh, Hammad, Eman, Enright, Michael, Behmann, Fawzi, Chorti, Arsenia, Cheema, Ahmad, Kadio, Kassi, Urbina-Pineda, Julia, Alam, Khaled, Limam, Ahmed, Chu, Fred, Lester, John, Park, Jong-Geun, Bio-Ukeme, Joseph, Pawar, Sanjay S, Layton, Roslyn, Ramchandran, Prakash, Okonkwo, Kingsley, Ong, Lyndon, Emmelmann, Marc, Issa, Omneya, Arul, Rajakumar, Malik, Sireen, Krishnan, Sivarama, Sugumar, Suresh, Lala, Tk, Borst, Matthew, Kloza, Brad, Kurt, Gunes Karabulut
Publikováno v:
Dutta, A, Hammad, E, Enright, M, Behmann, F, Chorti, A, Cheema, A, Kadio, K, Urbina-Pineda, J, Alam, K, Limam, A, Chu, F, Lester, J, Park, J-G, Bio-Ukeme, J, Pawar, S S, Layton, R, Ramchandran, P, Okonkwo, K, Ong, L, Emmelmann, M, Issa, O, Arul, R, Malik, S, Krishnan, S, Sugumar, S, Lala, T, Borst, M, Kloza, B & Kurt, G K 2022, Security and Privacy . in 2022 IEEE Future Networks World Forum (FNWF) ., 10056734, IEEE, IEEE Future Networks World Forum (FNWF), pp. 1-71, 2022 IEEE Future Networks World Forum (FNWF), 10/10/2022 . https://doi.org/10.1109/FNWF55208.2022.00131
The digital transformation brought on by 5G is redefining current models of end-to-end (E2E) connectivity and service reliability to include security-by-design principles necessary to enable 5G to achieve its promise. 5G trustworthiness highlights th