Topic Review
6G Cellular Networks
There are continued advances in the internet and communication fields regarding the deployment of 5G-based applications. It is expected that by 2030, 6G applications will emerge as a continued evolution of the mobile network. Blockchain technology is one of the leading supporting technologies predicted to provide a secure and unique network to 6G-enabled devices, transactions, and applications. It is anticipated that the 6G mobile networks will be virtualized, have cloud-based systems, and aim to be the foundation for the Internet of Everything.
  • 934
  • 13 Jun 2022
Topic Review
6G Enabled Light Weight Authentication Protocol for UAVs
In the 6G network, with blockchain and unmanned aerial vehicles (UAVs) authentication, the network decentralization and resource sharing would minimize resource under-utilization thereby facilitating PG targets. Furthermore, through an appropriate selection of blockchain type and consensus algorithms, the SG’s needs of UAV authentication in 6G network applications can also be readily addressed.
  • 479
  • 17 Feb 2023
Topic Review
A Lightweight Double-Stage Scheme to Identify Malicious DNS
The Domain Name System (DNS) protocol essentially translates domain names to IP addresses, enabling browsers to load and utilize Internet resources. Despite its major role, DNS is vulnerable to various security loopholes that attackers have continually abused.
  • 243
  • 04 Dec 2023
Topic Review
Advanced Persistent Thread and Common Systems Behavioral Sources
The rapid proliferation of Internet of Things (IoT) networks in Colombia and various global regions has unquestionably resulted in a significant increase in cyberattacks. This rapid expansion of interconnected devices carries significant implications for individuals, organizations, and governing entities.
  • 241
  • 08 Mar 2024
Topic Review
Adversarial Machine Learning Attacks against Intrusion Detection Systems
Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks before they enter the system and classifying them as malicious activities. However, the IDS approaches have shortcomings in misclassifying novel attacks or adapting to emerging environments, affecting their accuracy and increasing false alarms. To solve this problem, researchers have recommended using machine learning approaches as engines for IDSs to increase their efficacy. Machine-learning techniques are supposed to automatically detect the main distinctions between normal and malicious data, even novel attacks, with high accuracy. However, carefully designed adversarial input perturbations during the training or testing phases can significantly affect their predictions and classifications. Adversarial machine learning (AML) poses many cybersecurity threats in numerous sectors that use machine-learning-based classification systems, such as deceiving IDS to misclassify network packets.
  • 554
  • 09 Mar 2023
Topic Review
AI Enabling Technologies in Physical Layer Security
With the proliferation of 5G mobile networks within next-generation wireless communication, the design and optimization of 5G networks are progressing in the direction of improving the physical layer security (PLS) paradigm. This phenomenon is due to the fact that traditional methods for the network optimization of PLS fail to adapt new features, technologies, and resource management to diversified demand applications. To improve these methods, future 5G and beyond 5G (B5G) networks will need to rely on new enabling technologies. Therefore, approaches for PLS design and optimization that are based on artificial intelligence (AI) and machine learning (ML) have been corroborated to outperform traditional security technologies. This will allow future 5G networks to be more intelligent and robust in order to significantly improve the performance of system design over traditional security methods.
  • 573
  • 23 May 2022
Topic Review
AI-Based Resource Allocation Techniques in Wireless Sensor IoT
A wireless sensor network (WSN) is a network of several sensor nodes that are typically put in remote places to monitor environmental characteristics. The IoT (Internet of Things)-based restricted WSN has sparked a lot of attention and progress in order to attain improved resource utilisation as well as service delivery. For data transfer between heterogeneous devices, IoT requires a stronger communication network and an ideally placed energy-efficient WSN.
  • 388
  • 18 Jul 2022
Topic Review
An Algorithm for Personalizing SSVEP-Based Brain-Computer Interfaces
Brain–computer interfaces (BCIs) based on steady-state visually evoked potentials (SSVEPs) are inexpensive and do not require user training. Researchers herein describe how the light frequency could be selected individually. In particular, this is done via the proposed discomfort index, determined by the ratio of theta and beta rhythms in the EEG signal.
  • 114
  • 14 Nov 2023
Topic Review
AraMAMS Restaurants Reviews Corpus for Aspect-Based Sentiment Analysis
AraMA comprises 10,750 Google Maps reviews for restaurants in Riyadh, Saudi Arabia. It covers four aspect categories—food, environment, service, and price—along with four sentiment polarities: positive, negative, neutral, and conflict. All AraMA reviews are labeled with at least two aspect categories. A second version, named AraMAMS, includes reviews labeled with at least two different sentiments, making it the first Arabic multi-aspect, multi-sentiment dataset. Aspect-based sentiment analysis (ABSA) is a field of SA that goes one step further than SA by automatically assigning sentiments to certain features or aspects in the text.
  • 196
  • 21 Aug 2023
Topic Review
Artifact Recovery from Social Media Platforms
Social media applications have been ubiquitous in modern society, and their usage has grown exponentially over the years. With the widespread adoption of these platforms, social media has evolved into a significant origin of digital evidence in the domain of digital forensics.
  • 177
  • 05 Dec 2023
  • Page
  • of
  • 10