In recent years, malware detection has become an active research topic i...
The volume of malware and the number of attacks in IoT devices are risin...
Volunteer computing is an Internet-based distributed computing system in...
Selected procedures in [1] and additional simulation results are present...
Modern network applications demand low-latency traffic engineering in th...
In this paper, we develop four malware detection methods using Hamming
d...
Label manipulation attacks are a subclass of data poisoning attacks in
a...
The widespread adoption of smartphones dramatically increases the risk o...
Ever increasing number of Android malware, has always been a concern for...
In this paper, we focus on the problems of traffic engineering, failure
...
The proliferation of cloud data center applications and network function...
Service Function Chaining (SFC) allows the forwarding of a traffic flow ...
Smart city vision brings emerging heterogeneous communication technologi...
In this paper with the aid of genetic algorithm and fuzzy theory, we pre...