Zobrazeno 1 - 10
of 297
pro vyhledávání: '"Ren-Hung Hwang"'
Autor:
Zheng-Shao Chen, R. Vaitheeshwari, Eric Hsiao-Kuang Wu, Ying-Dar Lin, Ren-Hung Hwang, Po-Ching Lin, Yuan-Cheng Lai, Asad Ali
Publikováno v:
IEEE Access, Vol 12, Pp 141851-141865 (2024)
Advanced Persistent Threat (APT) groups pose significant cybersecurity threats due to their sophisticated and persistent nature. This study introduces a novel methodology to understand their collaborative patterns and shared objectives, which is cruc
Externí odkaz:
https://doaj.org/article/fc5ade556af345fa93441377d79f694b
Publikováno v:
IEEE Access, Vol 12, Pp 127018-127050 (2024)
With the rapid development of artificial intelligence and a new generation of network technologies, the Internet of Things (IoT) is expanding worldwide. Malicious agents consistently exploit new technical vulnerabilities to access the various IoT sys
Externí odkaz:
https://doaj.org/article/7fd298ddd9aa4ef5950d0e5c47e50377
Publikováno v:
IEEE Access, Vol 11, Pp 63958-63971 (2023)
Local access data networks (LADNs) are promising paradigms for reducing latency, decreasing energy consumption, and improving the quality of service (QoS) of fifth-generation (5G) radio access networks (RANs) that support vehicle-to-everything (V2X)
Externí odkaz:
https://doaj.org/article/38e874bf1f1944bd8c6ccb28de85c263
Publikováno v:
IEEE Access, Vol 10, Pp 15247-15260 (2022)
As a result of the explosion of security attacks and the complexity of modern networks, machine learning (ML) has recently become the favored approach for intrusion detection systems (IDS). However, the ML approach usually faces three challenges: mas
Externí odkaz:
https://doaj.org/article/0b894e7af5fd4cab87e539ceac029d9b
Publikováno v:
Sensors, Vol 23, Iss 10, p 4698 (2023)
Virtualization is a core 5G network technology which helps telecom companies significantly reduce capital expenditure and operating expenses by deploying multiple services on the same hardware infrastructure. However, providing QoS-guaranteed service
Externí odkaz:
https://doaj.org/article/20114c0b38624282b82db8f9d2c3d661
Publikováno v:
IEEE Access, Vol 8, Pp 30387-30399 (2020)
Various attacks have emerged as the major threats to the success of a connected world like the Internet of Things (IoT), in which billions of devices interact with each other to facilitate human life. By exploiting the vulnerabilities of cheap and in
Externí odkaz:
https://doaj.org/article/6404e425297e49ffb5ef24b1be64b829
Publikováno v:
IEEE Access, Vol 8, Pp 211723-211737 (2020)
Vehicle-to-Everything (V2X) communications are vital for autonomous vehicles to share sensing data about the surrounding environment, particularly in non-line-of-sight (NLOS) areas where the camera and radar systems often perform poorly. However, an
Externí odkaz:
https://doaj.org/article/6d6e526f14c84994bb8fa361c3ab2a64
Publikováno v:
Sensors, Vol 23, Iss 2, p 853 (2023)
Deep learning technology has developed rapidly in recent years and has been successfully applied in many fields, including face recognition. Face recognition is used in many scenarios nowadays, including security control systems, access control manag
Externí odkaz:
https://doaj.org/article/a34597ea879340c98c935e82ca6381a1
Publikováno v:
IEEE Access, Vol 7, Pp 51915-51932 (2019)
Low Power Wireless (LPW) networks have recently been emerging as key candidates to offer affordable connectivity for the constrained devices in the Internet of Things (IoT). However, they also raise major security concerns due to the inherent securit
Externí odkaz:
https://doaj.org/article/6d29fafbdb0a4dd9ba713f060ffc1bd3
Publikováno v:
Applied Sciences, Vol 12, Iss 17, p 8622 (2022)
Resolving traffic congestion caused by sudden events (e.g., an accident, lane closed due to construction) on the freeway has always been a problem that is challenging to address perfectly. The congestion resolution can take hours if the congestion is
Externí odkaz:
https://doaj.org/article/f0dc641fe1834255918e11e9beb9a7dc