EditorialSpringer Science and Business Media LLC - Tập 2 Số 4 - Trang 173-173 - 2016
Juan Carlos Augusto, Antonio Coronato
Self-adaptive deployment of services in mobile environments: a study of the communication reliability on the host election algorithmSpringer Science and Business Media LLC - Tập 2 - Trang 197-207 - 2016
Gabriel Guerrero-Contreras, Sara Balderas-Díaz, Carlos Rodríguez-Domínguez, José Luis Garrido, Aurora Valenzuela
Self-adaptive service deployment and replication are one of the possible approaches to address the changing computational conditions of mobile-based environments in order to ensure certain quality attributes of the system. The host election for the dynamic placement of service replicas is one of the main steps in the process to ensure the availability, reliability and performance in mobile distrib...... hiện toàn bộ
Reliability and human factors in Ambient Assisted Living environmentsSpringer Science and Business Media LLC - Tập 3 - Trang 139-157 - 2017
Filippo Palumbo, Davide La Rosa, Erina Ferro, Davide Bacciu, Claudio Gallicchio, Alessio Micheli, Stefano Chessa, Federico Vozzi, Oberdan Parodi
Malnutrition, sedentariness, and cognitive decline in elderly people represent the target areas addressed by the DOREMI project. It aimed at developing a systemic solution for elderly, able to prolong their functional and cognitive capacity by empowering, stimulating, and unobtrusively monitoring the daily activities according to well-defined “Active Ageing” life-style protocols. Besides the key f...... hiện toàn bộ
mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection systemSpringer Science and Business Media LLC - Tập 9 - Trang 333-347 - 2023
Varun Prabhakaran, Ashokkumar Kulandasamy
Intrusion detection is a prominent factor in the cybersecurity domain that prevents the network from malicious attacks. Cloud security is not satisfactory for securing the user’s information because it is based on standard protocols. Hence, cloud users cannot fully trust the security offered by cloud service providers. The state-of-the-art techniques create clusters for classes and manually label ...... hiện toàn bộ
Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSNSpringer Science and Business Media LLC - - Trang 1-17 - 2023
Rahul Das, Mona Dwivedi
The widespread use of hierarchical wireless sensor networks (HWSN) in various industries, including environmental monitoring, healthcare, and intrusion detection, has made the development of trust among sensor nodes (SNs) essential for enhancing security, dependability, and productive cooperation. However, the existing techniques for HWSN trust management are ineffective because of their poor reli...... hiện toàn bộ
Privacy, reputation, and incentive provision for vehicular social networksSpringer Science and Business Media LLC - Tập 9 - Trang 447-461 - 2022
Sanaz Zamani, Behrouz Tork Ladani, Maede Ashouri Talouki
Nowadays, the increasing use of internet in vehicular environments leads to the Vehicular Social Network (VSN) concept as an instance of Internet of Things applications in transportation industry. Information sharing between users in vehicular networks should be done in a privacy-preserving manner, especially users’ location privacy should be preserved. It is also essential to motivate users to pa...... hiện toàn bộ