Most Downloaded Articles

Open access

ISSN: 2352-8648
CN: 50-1212/TN
p-ISSN: 2468-5925

Network traffic classification: Techniques, datasets, and challenges

In network traffic classification, it is important to understand the correlation between network traffic and its causal application, protocol, or service group, for example, in facilitating lawful interception,...

IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic

A network intrusion detection system is critical for cyber security against illegitimate attacks. In terms of feature perspectives, network traffic may include a variety of elements such as attack reference,...

Integration of data science with the intelligent IoT (IIoT): Current challenges and future perspectives

The Intelligent Internet of Things (IIoT) involves real-world things that communicate or interact with each other through networking technologies by collecting data from these “things” and using intelligent...

A survey on communication protocols and performance evaluations for Internet of Things

The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology...

Intelligent Transportation Systems: A Critical Review of Integration of Cyber-Physical Systems (CPS) and Industry 4.0

The concept of Cyber-Physical Systems (CPS) enables the creation of a complex network that includes sensors integrated into vehicles and infrastructure, facilitating seamless data acquisition and transfer....

A systematic literature review of blockchain cyber security

Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through...

A survey on semantic communications: Technologies, solutions, applications and challenges

Semantic Communication (SC) has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput...

Balancing sustainability and security: A review of 5G and IoT in smart cities

This century's rapid urbanization has disrupted urban governance, sustainability, and resource management. The Internet of Things (IoT) and 5G have the potential to transform smart cities through real-time...

Software defined satellite networks: A survey

In recent years, satellite networks have been proposed as an essential part of next-generation mobile communication systems. Software defined networking techniques are introduced in satellite networks...

Feature extraction for machine learning-based intrusion detection in IoT networks

A large number of network security breaches in IoT networks have demonstrated the unreliability of current Network Intrusion Detection Systems (NIDSs). Consequently, network interruptions and loss of...

Security and privacy in 6G networks: New areas and new challenges

With the deployment of more and more 5g networks, the limitations of 5g networks have been found, which undoubtedly promotes the exploratory research of 6G networks as the next generation solutions....

Security and privacy in edge computing: a survey of electric vehicles

Electric Vehicles (EVs) have developed into a complex ecosystem that includes many technical components such as task offloading on mobile devices, the Internet of Vehicles (IoV), and smart grids. Moreover,...

A review on edge analytics: Issues, challenges, opportunities, promises, future directions, and applications

Edge technology aims to bring cloud resources (specifically, the computation, storage, and network) to the closed proximity of the edge devices, i.e., smart devices where the data are produced and consumed....

Green scheduling for LLM workloads with model and data reuse across geo-distributed data centers

The explosive proliferation of Large Language Models (LLMs) imposes significant energy and operational burdens on Geographically Distributed Data Centers (GDDCs), thereby demanding an efficient mechanism...

Visible light communication: Applications, architecture, standardization and research challenges

The Radio Frequency (RF) communication suffers from interference and high latency issues. Along with this, RF communication requires a separate setup for transmission and reception of RF waves. Overcoming...

How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities

The ongoing expansion of the Industrial Internet of Things (IIoT) is enabling the possibility of effective Industry 4.0, where massive sensing devices in heterogeneous environments are connected through...

A comprehensive survey of artificial intelligence applications in UAV-enabled wireless networks

This comprehensive survey paper examines the applications of Artificial Intelligence (AI) in Unmanned Aerial Vehicle (UAV)-enabled wireless networks. With the increasing demand for efficient and adaptive...

Autonomous network management for 6G communication: A comprehensive survey

The rapid advancement of 6G communication networks presents both considerable problems and opportunities in network management, necessitating sophisticated solutions that extend beyond conventional...

Pivotal role of digital twins in the metaverse: A review

The ascent of the metaverse signifies a profound transformation in our digital landscape, ushering in a complex network of interlinked virtual domains and digital spaces. In this burgeoning metaverse,...

A new technology perspective of the Metaverse: Its essence, framework and challenges

The Metaverse depicts a parallel digitalized world where virtuality and reality are fused. It has economic and social systems like those in the real world and provides intelligent services and applications....

Privacy-preserving computation meets quantum computing: A scoping review

Privacy-Preserving Computation (PPC) comprises the techniques, schemes and protocols which ensure privacy and confidentiality in the context of secure computation and data analysis. Most of the current...

Internet of robotic things for mobile robots: Concepts, technologies, challenges, applications, and future directions

Nowadays, Multi Robotic System (MRS) consisting of different robot shapes, sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world...

An analysis of energy consumption and carbon footprints of cryptocurrencies and possible solutions

There is an urgent need to control global warming caused by humans to achieve a sustainable future. CO2 levels are rising steadily, and while countries worldwide are actively moving toward the sustainability...

Generative IoT (GIoT): Advancing IoT with Generative AI and Large Language Models

With the fusion of Generative AI—particularly large language models (LLMs), multi-modal language models (MLMs) such as vision–language models (VLMs), and large action models (LAMs)—with the Artificial...

A digital twin-based quadruped robot system with scene perception, fast communication, and holographic interaction

This paper develops a quadruped robot virtual-real interactive control system based on digital twin technology. The system is designed to address key challenges in robotics technology, including real-time...

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.