has been cited by the following article(s):
[1]
|
Optimizing Cybersecurity Attack Detection in Computer Networks: A Comparative Analysis of Bio-Inspired Optimization Algorithms Using the CSE-CIC-IDS 2018 Dataset
Applied Sciences,
2024
DOI:10.3390/app14031044
|
|
|
[2]
|
Foundations and Practice of Security
Lecture Notes in Computer Science,
2023
DOI:10.1007/978-3-031-30122-3_9
|
|
|
[3]
|
Blockchain Based Wireless Sensor Networks for Detecting Nodes
Journal of Smart Internet of Things,
2023
DOI:10.2478/jsiot-2023-0007
|
|
|
[4]
|
Effectiveness Evaluation of Different IDSs Using Integrated Fuzzy MCDM Model
Electronics,
2022
DOI:10.3390/electronics11060859
|
|
|
[5]
|
A Brief Overview of Energy Efficiency Resources in Emerging Wireless Communication Systems
Telecom,
2022
DOI:10.3390/telecom3020016
|
|
|
[6]
|
AI federated learning based improvised random Forest classifier with error reduction mechanism for skewed data sets
International Journal of Pervasive Computing and Communications,
2022
DOI:10.1108/IJPCC-02-2022-0034
|
|
|
[7]
|
Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey
IEEE Access,
2021
DOI:10.1109/ACCESS.2021.3111923
|
|
|
[8]
|
Energy Efficient Design Techniques in Next-Generation Wireless Communication Networks: Emerging Trends and Future Directions
Wireless Communications and Mobile Computing,
2020
DOI:10.1155/2020/7235362
|
|
|