Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications最新文献

筛选
英文 中文
Risk Assessment Method of IoT Host Based on Attack Graph 基于攻击图的物联网主机风险评估方法
Hongyu Yang, Haihang Yuan, Liang Zhang
{"title":"Risk Assessment Method of IoT Host Based on Attack Graph","authors":"Hongyu Yang, Haihang Yuan, Liang Zhang","doi":"10.1007/s11036-023-02198-4","DOIUrl":"https://doi.org/10.1007/s11036-023-02198-4","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89276125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Security and 5G-assisted Industrial Internet of Things using Novel Artificial Adaption based Evolutionary Algorithm 基于新型人工适应进化算法的网络安全和5g辅助工业物联网
S. Singh, G. Piras, W. Viriyasitavat, Elham Kariri, Kusum Yadav, G. Dhiman, S. Vimal, S. B. Khan
{"title":"Cyber Security and 5G-assisted Industrial Internet of Things using Novel Artificial Adaption based Evolutionary Algorithm","authors":"S. Singh, G. Piras, W. Viriyasitavat, Elham Kariri, Kusum Yadav, G. Dhiman, S. Vimal, S. B. Khan","doi":"10.1007/s11036-023-02230-7","DOIUrl":"https://doi.org/10.1007/s11036-023-02230-7","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82697682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EABERT: An Event Annotation Enhanced BERT Framework for Event Extraction ebert:用于事件提取的事件注释增强BERT框架
Qisen Xi, Yizhi Ren, Liang Kou, Yongrui Cui, Zuohua Chen, Lifeng Yuan, Dong Wang
{"title":"EABERT: An Event Annotation Enhanced BERT Framework for Event Extraction","authors":"Qisen Xi, Yizhi Ren, Liang Kou, Yongrui Cui, Zuohua Chen, Lifeng Yuan, Dong Wang","doi":"10.1007/s11036-023-02203-w","DOIUrl":"https://doi.org/10.1007/s11036-023-02203-w","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89050020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Stochastic Performance Model and Mobility Analysis in the Integrated Cloud-Fog-Edge Computing System 云-雾-边缘集成计算系统的随机性能模型及可移动性分析
Yonal Kirsal
{"title":"A Stochastic Performance Model and Mobility Analysis in the Integrated Cloud-Fog-Edge Computing System","authors":"Yonal Kirsal","doi":"10.1007/s11036-023-02202-x","DOIUrl":"https://doi.org/10.1007/s11036-023-02202-x","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83380119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Stacked Ensemble Approach to Generalize the Classifier Prediction for the Detection of DDoS Attack in Cloud Network 云网络DDoS攻击检测分类器预测的堆叠集成推广方法
Priyanka Verma, A. R. K. Kowsik, R. Pateriya, Nitesh Bharot, Ankit Vidyarthi, Deepak Gupta
{"title":"A Stacked Ensemble Approach to Generalize the Classifier Prediction for the Detection of DDoS Attack in Cloud Network","authors":"Priyanka Verma, A. R. K. Kowsik, R. Pateriya, Nitesh Bharot, Ankit Vidyarthi, Deepak Gupta","doi":"10.1007/s11036-023-02225-4","DOIUrl":"https://doi.org/10.1007/s11036-023-02225-4","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74048323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Optimization of Vehicular Fog Network Towards Minimizing Latency 面向最小延迟的车辆雾网络建模与优化
Deepali Binwal, R. Tiwari, M. Kapoor
{"title":"Modeling and Optimization of Vehicular Fog Network Towards Minimizing Latency","authors":"Deepali Binwal, R. Tiwari, M. Kapoor","doi":"10.1007/s11036-023-02197-5","DOIUrl":"https://doi.org/10.1007/s11036-023-02197-5","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77178609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Transformation-Encoding-Attention Framework for Multivariate Time Series Anomaly Detection in IoT Environment 物联网环境下多变量时间序列异常检测的有效转换-编码-关注框架
Rui Zhang, Juan Chen, Yujia Song, Wenyu Shan, Peng Chen, Yunni Xia
{"title":"An Effective Transformation-Encoding-Attention Framework for Multivariate Time Series Anomaly Detection in IoT Environment","authors":"Rui Zhang, Juan Chen, Yujia Song, Wenyu Shan, Peng Chen, Yunni Xia","doi":"10.1007/s11036-023-02204-9","DOIUrl":"https://doi.org/10.1007/s11036-023-02204-9","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"86 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76518574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game Theoretic Systematic Approach for Transportation Quality Assessment 交通运输质量评价的博弈论系统方法
Abdullah Alqahtani, Shtwai Alsubai, Mohemmed Sha, Munish Bhatia
{"title":"Game Theoretic Systematic Approach for Transportation Quality Assessment","authors":"Abdullah Alqahtani, Shtwai Alsubai, Mohemmed Sha, Munish Bhatia","doi":"10.1007/s11036-023-02233-4","DOIUrl":"https://doi.org/10.1007/s11036-023-02233-4","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79892533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection Method Based on Denoising Diffusion Probabilistic Models for UAV Networks 基于去噪扩散概率模型的无人机网络入侵检测方法
Yingshu Wang, Jian Ding, Xiaomeng He, Qian Wei, Shu Yuan, Jun Zhang
{"title":"Intrusion Detection Method Based on Denoising Diffusion Probabilistic Models for UAV Networks","authors":"Yingshu Wang, Jian Ding, Xiaomeng He, Qian Wei, Shu Yuan, Jun Zhang","doi":"10.1007/s11036-023-02222-7","DOIUrl":"https://doi.org/10.1007/s11036-023-02222-7","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72954723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collection and Integration of Patent Data for Analysis and Validation of Brazilian Technical Production 巴西技术生产分析与验证专利数据的收集与整合
Raulivan Rodrigo da Silva, T. M. R. Dias, Washington Luís Ribeiro de Carvalho Segundo
{"title":"Collection and Integration of Patent Data for Analysis and Validation of Brazilian Technical Production","authors":"Raulivan Rodrigo da Silva, T. M. R. Dias, Washington Luís Ribeiro de Carvalho Segundo","doi":"10.1007/s11036-023-02234-3","DOIUrl":"https://doi.org/10.1007/s11036-023-02234-3","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87886548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信