Palter 发表于 2025-3-26 23:33:37

Merging Attack-Defense Tree and Game Theory to Analyze Vehicular Ad Hoc Network Security,al, we construct an attack-defense tree to model the possible attack and countermeasure that can be assumed. Then we present a detailed analysis based on game theory to search out a Nash equilibrium that reflects the mutual interaction between the attacker and defender.

飓风 发表于 2025-3-27 04:46:00

Deep Reinforcement Learning Modeling of a V2V Communication-Based Bike Avoidance Protocol for Increstigate the use of Deep Q-Learning to optimize vehicle time loss. Finally, we discuss deeply the performance of our proposed DRL-based solution compared to similar traditional programming-based systems.

ENNUI 发表于 2025-3-27 09:16:58

http://reply.papertrans.cn/24/2326/232532/232532_33.png

PAC 发表于 2025-3-27 10:13:50

Book 2022n behavior prediction, software-defined networking, congestion control, communication network optimization, security, and anomaly detection. The book features chapters from a large spectrum of authors including researchers, students, as well as industrials involved in research and development..

青石板 发表于 2025-3-27 17:10:24

Book 2022ks, their layers, as well as their applications. The book first offers an introduction to recent trends regarding communication networks. The authors then provide an overview of theoretical concepts of AI/ML, techniques and protocols used in different layers of communication. Furthermore, this book

exclamation 发表于 2025-3-27 18:01:11

https://doi.org/10.1007/978-3-211-69367-4applications with diverse requirements including high traffic volume, massive connectivity, high quality of service, and low latency. To fulfill such requirements in 5G and beyond, new emerging technologies such as SDN, NFV, MEC, and CC are being deployed. However, these technologies raise several i

paroxysm 发表于 2025-3-27 22:53:33

https://doi.org/10.1007/978-3-211-69367-4stems. This is due to its high flexibility in spectrum usage. However, the presence of intersymbol interference (ISI) makes the application of multiple-input multiple-output (MIMO) with FBMC/OQAM quite challenging. In this chapter, we propose a novel blind detection approach based on a deep neural n

消灭 发表于 2025-3-28 03:09:48

Das Grundkonzept der Marktzinsmethoden of mobile generations has seen a diversity of services, which includes data as the first service, then video, and other services. The fifth-generation network (5G) is the future of information networks. It is not really a further advancement of the fourth generation (4G) but another kind of mobile

支柱 发表于 2025-3-28 09:29:55

Das Grundkonzept der Marktzinsmethodenvolving autonomous vehicles. Numerous algorithms and libraries have been developed to implement reliable and safe detection of traffic signs. In this project, we aim to examine the performance of two advanced neural network models, namely, convolutional neural networks and recurrent neural networks

SOBER 发表于 2025-3-28 10:42:18

Problemstellung und Aufbau der Arbeit,dered one of the most significant concepts for enhancing current and future transportation safety and efficiency. Nonetheless, the existing safety approaches rely principally on preventive approaches although a thorough security analysis is missing. This paper aims to analyze vehicular system behavi
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Computational Intelligence in Recent Communication Networks; Mariya Ouaissa,Zakaria Boulouard,Bassma Guermah Book 2022 The Editor(s) (if a