{"title":"Phishing detection model using feline finch optimisation-based LSTM classifier","authors":"M. S. Umar, Mohd Shoaib","doi":"10.1504/ijsnet.2023.10058550","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.10058550","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"184 1","pages":"205-220"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80534212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A rate adaption algorithm for backscatter networks in mobile scenes","authors":"Jia Liu, Baofeng Zhao","doi":"10.1504/IJSNET.2023.131652","DOIUrl":"https://doi.org/10.1504/IJSNET.2023.131652","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"25 1","pages":"137-144"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90788867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new indoor positioning system for WSN: application in smart parking","authors":"Mostapha Laaouafy, Fatima Lakrami, O. Labouidya","doi":"10.1504/IJSNET.2023.131655","DOIUrl":"https://doi.org/10.1504/IJSNET.2023.131655","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"95 1","pages":"79-86"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84415319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The pricing decisions for the cloud service supply chain: service quality and power structure","authors":"Mengdi Yao, Guolong She, Donglin Chen, Song Ke","doi":"10.1504/ijsnet.2023.10057472","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.10057472","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"98 1","pages":"183-195"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73632400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and implementation on a Trojan detection approach based on sensor path delay for golden-free chips","authors":"Zhongxue Yang, Yiqin Bao","doi":"10.1504/ijsnet.2023.10057550","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.10057550","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"74 1","pages":"238-247"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86299971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fernando Vicente, A. Guelfi, Anderson A. A. Silva, M. Azevedo, Bruno Luz, E. T. Ueda, S. Kofuji
{"title":"Analysis and handling of biased data provided by wireless sensor networks with lack of energy","authors":"Fernando Vicente, A. Guelfi, Anderson A. A. Silva, M. Azevedo, Bruno Luz, E. T. Ueda, S. Kofuji","doi":"10.1504/ijsnet.2022.10052997","DOIUrl":"https://doi.org/10.1504/ijsnet.2022.10052997","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"50 1","pages":"137-151"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86412989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of cognitive radio networks using reconfigurable intelligent surfaces with RF energy harvesting for Nakagami channels","authors":"Raed I. Alhamad","doi":"10.1504/ijsnet.2022.10051327","DOIUrl":"https://doi.org/10.1504/ijsnet.2022.10051327","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"83 1","pages":"77-84"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77272920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The flaws of Internet of Things (IoT) intrusion detection and prevention schemes","authors":"Saher Ghayyad, S. Du, A. Kurien","doi":"10.1504/ijsnet.2022.10044117","DOIUrl":"https://doi.org/10.1504/ijsnet.2022.10044117","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"40 1","pages":"25-36"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80926407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}