355 results on '"Mohan, Gurusamy"'
Search Results
2. Deep Reinforcement Learning for Task Partitioning and Partial Offloading in UAV Networks.
3. MEC-Hopper: DRL-Based Adaptive Multi-Hop Service Provisioning in UAV-Assisted MEC.
4. FedWAvg: Mitigating Model Contamination in UAV Networks through Federated Weighted Average for Weather Forecasting.
5. Securing the Skies: An IRS-Assisted AoI-Aware Secure Multi-UavSystem with Efficient Task Offloading.
6. Efficient Task Offloading Through Federated Learning in UAV-Assisted Edge Networks.
7. ZEST: Attention-based Zero-Shot Learning for Unseen IoT Device Classification.
8. PRIORITI: scoring and categorization-based threat prioritization.
9. Meeting the Requirements of Internet of Things: The Promise of Edge Computing.
10. Distributed Service Provisioning With Collaboration of Edge and Cloud in Industry 5.0.
11. Whale-optimized LSTM networks for enhanced automatic text summarization
12. ADSeq-5GCN: Anomaly Detection from Network Traffic Sequences in 5G Core Network Control Plane.
13. D3T: Double Deep Q-Network Decision Transformer for Service Function Chain Placement.
14. DOSM: Demand-Prediction based Online Service Management for Vehicular Edge Computing Networks.
15. NPRA: A Novel Predictive Resource Allocation Mechanism for Next Generation Network Slicing.
16. Optimizing Vehicle-to-Edge Mapping with Load Balancing for Attack-Resilience in IoV.
17. A Combined Approach of Industrial Edge Computing and Machine Learning for Predictive Maintenance.
18. Efficient Schemes for Improved Performance in 6TiSCH Networks.
19. Securing the Skies: An IRS-Assisted AoI-Aware Secure Multi-UAV System with Efficient Task Offloading.
20. On Attack-Resilient Service Placement and Availability in Edge-Enabled IoV Networks.
21. A Gaming and Trust-Model-Based Countermeasure for DIS Attack on 6TiSCH IoT Networks.
22. Parrondo's Paradox-Based Enhanced Beacon Transmission in 6TiSCH Networks.
23. LOG-OFF: A Novel Behavior Based Authentication Compromise Detection Approach.
24. Inferring Autoscale Information from NFV MANO for Launching Attacks - An Experimental Study with Cloudified 5G.
25. APEX: Characterizing Attack Behaviors from Network Anomalies.
26. Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks.
27. Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid Approach.
28. ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly Detection.
29. DRLD-SP: A Deep-Reinforcement-Learning-Based Dynamic Service Placement in Edge-Enabled Internet of Vehicles.
30. Machine Learning for Security in Vehicular Networks: A Comprehensive Survey.
31. RAVEN: Resource Allocation Using Reinforcement Learning for Vehicular Edge Computing Networks.
32. ZEST: Attention-based Zero-Shot Learning for Unseen IoT Device Classification.
33. Reliable and Efficient Data Collection in UAV-based IoT Networks.
34. Adversarial Attacks Against Deep Reinforcement Learning Framework in Internet of Vehicles.
35. Reinforcement Learning-based Dynamic Service Placement in Vehicular Networks.
36. Privacy-Aware Switch-Controller Mapping in SDN-Based IoT Networks.
37. Generative Adversarial Network and Auto Encoder based Anomaly Detection in Distributed IoT Networks.
38. JaDe: Low Power Jamming Detection Using Machine Learning in Vehicular Networks.
39. Cost-Aware Feature Selection for IoT Device Classification.
40. ADEPT: Detection and Identification of Correlated Attack Stages in IoT Networks.
41. Game-Theoretic Framework for Malicious Controller Detection in Software Defined Networks.
42. Multi-Objective Control Plane Dimensioning in Hybrid SDN/Legacy Networks.
43. Optimizing Vehicle-to-Edge Mapping with Load Balancing for Attack-Resilience in IoV.
44. On Attack-Resilient Service Placement and Availability in Edge-enabled IoV Networks.
45. GFCL: A GRU-based Federated Continual Learning Framework against Adversarial Attacks in IoV.
46. E-Audit: Distinguishing and investigating suspicious events for APTs attack detection.
47. A feature-ranking framework for IoT device classification.
48. Resilient VNF Placement for Service Chain Embedding in Diversified 5G Network Slices.
49. Fast and Adaptive Failure Recovery using Machine Learning in Software Defined Networks.
50. Crossfire Attack Detection Using Deep Learning in Software Defined ITS Networks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.