Most Downloaded Articles

Open access

ISSN: 2352-8648
CN: 50-1212/TN
p-ISSN: 2468-5925

Network traffic classification: Techniques, datasets, and challenges

In network traffic classification, it is important to understand the correlation between network traffic and its causal application, protocol, or service group, for example, in facilitating lawful interception,...

Share article

A survey on deep learning for textual emotion analysis in social networks

Textual Emotion Analysis (TEA) aims to extract and analyze user emotional states in texts. Various Deep Learning (DL) methods have developed rapidly, and they have proven to be successful in many fields...

Share article

A systematic literature review of blockchain cyber security

Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through...

Share article

Adaptive FEC coding and cooperative relayed wireless image transmission

High quality image transmission through smart devices requires high transmission rate, throughput and low Bit Error Rate (BER). At the same time, energy efficiency is always the top issue for the battery-based...

Share article

Internet of robotic things for mobile robots: Concepts, technologies, challenges, applications, and future directions

Nowadays, Multi Robotic System (MRS) consisting of different robot shapes, sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world...

Share article

An analysis of energy consumption and carbon footprints of cryptocurrencies and possible solutions

There is an urgent need to control global warming caused by humans to achieve a sustainable future. CO2 levels are rising steadily, and while countries worldwide are actively moving toward the sustainability...

Share article

Dynamic defenses in cyber security: Techniques, methods and challenges

Driven by the rapid development of the Internet of Things, cloud computing and other emerging technologies, the connotation of cyberspace is constantly expanding and becoming the fifth dimension of...

Share article

A survey on semantic communications: technologies, solutions, applications and challenges

Semantic Communications (SC) has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput...

Share article

Software defined satellite networks: A survey

In recent years, satellite networks have been proposed as an essential part of next-generation mobile communication systems. Software defined networking techniques are introduced in satellite networks...

Share article

Security and privacy in 6G networks: New areas and new challenges

With the deployment of more and more 5g networks, the limitations of 5g networks have been found, which undoubtedly promotes the exploratory research of 6G networks as the next generation solutions....

Share article

Machine learning for internet of things data analysis: a survey

Rapid developments in hardware, software, and communication technologies have facilitated the emergence of Internet-connected sensory devices that provide observations and data measurements from the...

Share article

IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic

A network intrusion detection system is critical for cyber security against illegitimate attacks. In terms of feature perspectives, network traffic may include a variety of elements such as attack reference,...

Share article

A new technology perspective of the Metaverse: Its essence, framework and challenges

The Metaverse depicts a parallel digitalized world where virtuality and reality are fused. It has economic and social systems like those in the real world and provides intelligent services and applications....

Share article

Visible light communication: Applications, architecture, standardization and research challenges

The Radio Frequency (RF) communication suffers from interference and high latency issues. Along with this, RF communication requires a separate setup for transmission and reception of RF waves. Overcoming...

Share article

Reconfigurable intelligent surface: design the channel – a new opportunity for future wireless networks

In this paper, we survey state-of-the-art research outcomes in the burgeoning field of Reconfigurable Intelligent Surface (RIS), given its potential for significant performance enhancement of next-generation...

Share article

Attacks and defences on intelligent connected vehicles: a survey

Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle attacks (e.g.,...

Share article

A survey on communication protocols and performance evaluations for Internet of Things

The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology...

Share article

A survey on deploying mobile deep learning applications: A systemic and technical perspective

With the rapid development of mobile devices and deep learning, mobile smart applications using deep learning technology have sprung up. It satisfies multiple needs of users, network operators and service...

Share article

Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT

Some of the significant new technologies researched in recent studies include BlockChain (BC), Software Defined Networking (SDN), and Smart Industrial Internet of Things (IIoT). All three technologies...

Share article

Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects

Over the past years, the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human life. However, using machine learning...

Share article

COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities

Although cyber technologies benefit our society, there are also some related cybersecurity risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and technologies during...

Share article

Feature extraction for machine learning-based intrusion detection in IoT networks

A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems (NIDSs). Consequently, network interruptions and loss of...

Share article

A review of optimization methods for computation offloading in edge computing networks

Handling the massive amount of data generated by Smart Mobile Devices (SMDs) is a challenging computational problem. Edge Computing is an emerging computation paradigm that is employed to conquer this...

Share article

Sports match prediction model for training and exercise using attention-based LSTM network

Sports matches are very popular all over the world. The prediction of a sports match is helpful to grasp the team's state in time and adjust the strategy in the process of the match. It's a challenging...

Share article

How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities

The ongoing expansion of the Industrial Internet of Things (IIoT) is enabling the possibility of effective Industry 4.0, where massive sensing devices in heterogeneous environments are connected through...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.